Sciweavers

1636 search results - page 45 / 328
» Detecting similar software applications
Sort
View
ICIP
2007
IEEE
14 years 10 months ago
A Variational Approach to Exploit Prior Information in Object-Background Segregation: Application to Retinal Images
One of the main challenges in image segmentation is to adapt prior knowledge about the objects/regions that are likely to be present in an image, in order to obtain more precise d...
Luca Bertelli, Jiyun Byun, B. S. Manjunath
CORR
2006
Springer
242views Education» more  CORR 2006»
13 years 8 months ago
Matching Edges in Images ; Application to Face Recognition
: This communication describes a representation of images as a set of edges characterized by their position and orientation. This representation allows the comparison of two images...
Joël Le Roux, Philippe Chaurand, Mickael Urru...
ESSOS
2010
Springer
14 years 5 months ago
Idea: Towards Architecture-Centric Security Analysis of Software
Static security analysis of software has made great progress over the last years. In particular, this applies to the detection of lowlevel security bugs such as buffer overflows,...
Karsten Sohr, Bernhard Berger
SEW
2003
IEEE
14 years 1 months ago
Addressing Software Security and Mitigations in the Life Cycle
Traditionally, security is viewed as an organizational and Information Technology (IT) systems function comprising of firewalls, intrusion detection systems (IDS), system security...
David P. Gilliam, John D. Powell, Eric Haugh, Matt...
VEE
2012
ACM
252views Virtualization» more  VEE 2012»
12 years 4 months ago
libdft: practical dynamic data flow tracking for commodity systems
Dynamic data flow tracking (DFT) deals with tagging and tracking data of interest as they propagate during program execution. DFT has been repeatedly implemented by a variety of ...
Vasileios P. Kemerlis, Georgios Portokalidis, Kang...