Sciweavers

298 search results - page 38 / 60
» Computer security: quality rather than quantity
Sort
View
DSN
2004
IEEE
14 years 1 months ago
Verifying Web Applications Using Bounded Model Checking
The authors describe the use of bounded model checking (BMC) for verifying Web application code. Vulnerable sections of code are patched automatically with runtime guards, allowin...
Yao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung...
CVPR
2009
IEEE
15 years 5 months ago
LidarBoost: Depth Superresolution for ToF 3D Shape Scanning
Depth maps captured with time-of-flight cameras have very low data quality: the image resolution is rather limited and the level of random noise contained in the depth maps is v...
Sebastian Schuon (Stanford University), Christian ...
CHI
2005
ACM
14 years 10 months ago
The role of the author in topical blogs
Web logs, or blogs, challenge the notion of authorship. Seemingly, rather than a model in which the author's writings are themselves a contribution, the blog author weaves a ...
Scott Carter
CVPR
2009
IEEE
14 years 4 months ago
Image hallucination with feature enhancement
1 Example-based super-resolution recovers missing high frequencies in a magnified image by learning the correspondence between co-occurrence examples at two different resolution le...
Zhiwei Xiong, Xiaoyan Sun, Feng Wu
ICPR
2008
IEEE
14 years 4 months ago
A new multiobjective simulated annealing based clustering technique using stability and symmetry
Most clustering algorithms operate by optimizing (either implicitly or explicitly) a single measure of cluster solution quality. Such methods may perform well on some data sets bu...
Sriparna Saha, Sanghamitra Bandyopadhyay