Sciweavers

832 search results - page 128 / 167
» Effect of Malicious Synchronization
Sort
View
CODASPY
2012
12 years 5 months ago
Detecting repackaged smartphone applications in third-party android marketplaces
Recent years have witnessed incredible popularity and adoption of smartphones and mobile devices, which is accompanied by large amount and wide variety of feature-rich smartphone ...
Wu Zhou, Yajin Zhou, Xuxian Jiang, Peng Ning
ISSTA
2012
ACM
12 years 10 days ago
ViewPoints: differential string analysis for discovering client- and server-side input validation inconsistencies
Since web applications are easily accessible, and often store a large amount of sensitive user information, they are a common target for attackers. In particular, attacks that foc...
Muath Alkhalaf, Shauvik Roy Choudhary, Mattia Fazz...
CVPR
2006
IEEE
14 years 12 months ago
Robust People Tracking with Global Trajectory Optimization
Given three or four synchronized videos taken at eye level and from different angles, we show that we can effectively use dynamic programming to accurately follow up to six indivi...
François Fleuret, Jérôme Bercl...
ICIP
2008
IEEE
14 years 11 months ago
Real-time Light Fall-off Stereo
We present a real-time depth recovery system using Light Fall-off Stereo (LFS). Our system contains two co-axial point light sources (LEDs) synchronized with a video camera. The v...
Miao Liao, Liang Wang, Ruigang Yang, Minglun Gong
ICIP
2002
IEEE
14 years 11 months ago
Rule-based semantic summarization of instructional videos
We present a new content-based approach to summarize instructional videos. We first redefine "scene" in instructional videos. Focusing on one dominant scene type, that o...
Tiecheng Liu, John R. Kender