Sciweavers

1636 search results - page 89 / 328
» Detecting similar software applications
Sort
View
CCS
2007
ACM
15 years 10 months ago
Automated detection of persistent kernel control-flow attacks
This paper presents a new approach to dynamically monitoring operating system kernel integrity, based on a property called state-based control-flow integrity (SBCFI). Violations ...
Nick L. Petroni Jr., Michael W. Hicks
ICRA
2005
IEEE
158views Robotics» more  ICRA 2005»
15 years 10 months ago
Ball Detection and Predictive Ball Following Based on a Stereoscopic Vision System
— In this paper we describe an efficient software architecture for object-tracking, based on a stereoscopic vision system, that has been applied to a mobile robot controlled by ...
Davide Scaramuzza, Stefano Pagnottelli, Paolo Vali...
FPGA
2009
ACM
343views FPGA» more  FPGA 2009»
15 years 11 months ago
Fpga-based face detection system using Haar classifiers
This paper presents a hardware architecture for face detection based system on AdaBoost algorithm using Haar features. We describe the hardware design techniques including image s...
Junguk Cho, Shahnam Mirzaei, Jason Oberg, Ryan Kas...
ESEM
2007
ACM
15 years 8 months ago
Defect Detection Efficiency: Test Case Based vs. Exploratory Testing
This paper presents a controlled experiment comparing the defect detection efficiency of exploratory testing (ET) and test case based testing (TCT). While traditional testing lite...
Juha Itkonen, Mika Mäntylä, Casper Lasse...
ISMAR
2002
IEEE
15 years 9 months ago
MR Platform: A Basic Body on Which Mixed Reality Applications Are Built
This paper describes a platform package, called “MR Platform,” which we have been implementing for research and development of augmented reality technology and applications. T...
Shinji Uchiyama, Kazuki Takemoto, Kiyohide Satoh, ...