Sciweavers

766 search results - page 100 / 154
» Detecting modifications in paper documents: a coding approac...
Sort
View
ICVGIP
2008
13 years 10 months ago
Implementation of the "Local Rank Differences" Image Feature Using SIMD Instructions of CPU
Usage of statistical classifiers, namely AdaBoost and its modifications, in object detection and pattern recognition is a contemporary and popular trend. The computatiponal perfor...
Adam Herout, Pavel Zemcík, Roman Jurá...
ACIVS
2008
Springer
14 years 3 months ago
"Local Rank Differences" Image Feature Implemented on GPU
A currently popular trend in object detection and pattern recognition is usage of statistical classifiers, namely AdaBoost and its modifications. The speed performance of these cla...
Lukás Polok, Adam Herout, Pavel Zemcí...
SP
2002
IEEE
106views Security Privacy» more  SP 2002»
13 years 8 months ago
Using Programmer-Written Compiler Extensions to Catch Security Holes
This paper shows how system-speci c static analysis can nd security errors that violate rules such as \integers from untrusted sources must be sanitized before use" and \do n...
Ken Ashcraft, Dawson R. Engler
ECIS
2000
13 years 10 months ago
Community Health Assessments: A Data Warehousing Approach
- The measurement and assessment of health status in communities throughout the world is a massive information technology challenge. The Comprehensive Assessment for Tracking Commu...
Donald J. Berndt, Alan R. Hevner, James Studnicki
COMCOM
2006
121views more  COMCOM 2006»
13 years 9 months ago
Interactive Transparent Networking: Protocol meta modeling based on EFSM
the extensibility and evolution of network services and protocols had become a major research issue in recent years. The 'programmable' and 'active' network par...
Javed I. Khan, Raid Zaghal