Sciweavers

1663 search results - page 152 / 333
» Computer Security in the Real World
Sort
View

Publication
148views
15 years 5 months ago
ADSandbox: sandboxing JavaScript to fight malicious websites
We present ADSandbox, an analysis system for malicious websites that focusses on detecting attacks through JavaScript. Since, in contrast to Java, JavaScript does not have any bui...
193
Voted
DIGRA
2005
Springer
15 years 9 months ago
The Pervasive Interface; Tracing the Magic Circle
This paper is an addition to the discourse surrounding interface theory and pervasive games. A buzzword by nature, the term ´interface´ needs to be investigated and redefined in...
Eva Nieuwdorp
CVPR
2005
IEEE
16 years 5 months ago
Bayesian 3D Modeling from Images Using Multiple Depth Maps
This paper addresses the problem of reconstructing the geometry and color of a Lambertian scene, given some fully calibrated images acquired with wide baselines. In order to compl...
Pau Gargallo, Peter F. Sturm
ICCV
2003
IEEE
16 years 5 months ago
Phenomenological Eigenfunctions for Image Irradiance
We present a framework for calculating low-dimensional bases to represent image irradiance from surfaces with isotropic reflectance under arbitrary illumination. By representing t...
Peter Nillius, Jan-Olof Eklundh
106
Voted
ICPR
2008
IEEE
16 years 5 months ago
Uncertainty minimization in multi-sensor localization systems using model selection theory
Belief propagation methods are the state-of-the-art with multi-sensor state localization problems. However, when localization applications have to deal with multi-modality sensors...
Andreas Koschan, David L. Page, Hamparsum Bozdogan...