Sciweavers

8177 search results - page 1549 / 1636
» Detecting System Emulators
Sort
View
MM
2005
ACM
250views Multimedia» more  MM 2005»
15 years 8 months ago
An object-based video coding framework for video sequences obtained from static cameras
This paper presents a novel object-based video coding framework for videos obtained from a static camera. As opposed to most existing methods, the proposed method does not require...
Asaad Hakeem, Khurram Shafique, Mubarak Shah
MSR
2005
ACM
15 years 8 months ago
Improving evolvability through refactoring
Refactoring is one means of improving the structure of existing software. Locations for the application of refactoring are often based on subjective perceptions such as ”bad sme...
Jacek Ratzinger, Michael Fischer, Harald Gall
CCS
2005
ACM
15 years 8 months ago
Automatic diagnosis and response to memory corruption vulnerabilities
Cyber attacks against networked computers have become relentless in recent years. The most common attack method is to exploit memory corruption vulnerabilities such as buffer ove...
Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Chris...
ICIAR
2005
Springer
15 years 8 months ago
Real-Time and Robust Background Updating for Video Surveillance and Monitoring
Abstract. Background updating is an important aspect of dynamic scene analysis. Two critical problems: sudden camera perturbation and the sleeping person problem, which arise frequ...
Xingzhi Luo, Suchendra M. Bhandarkar
LPAR
2005
Springer
15 years 8 months ago
The Four Sons of Penrose
Abstract. We distill Penrose’s argument against the “artificial intelligence premiss”, and analyze its logical alternatives. We then clarify the different positions one can...
Nachum Dershowitz
« Prev « First page 1549 / 1636 Last » Next »