Sciweavers

384 search results - page 71 / 77
» Equivalence Relations on Classes of Computable Structures
Sort
View
SP
2007
IEEE
107views Security Privacy» more  SP 2007»
14 years 1 months ago
Lurking in the Shadows: Identifying Systemic Threats to Kernel Data
The integrity of kernel code and data is fundamental to the integrity of the computer system. Tampering with the kernel data is an attractive venue for rootkit writers since malic...
Arati Baliga, Pandurang Kamat, Liviu Iftode
MM
2005
ACM
188views Multimedia» more  MM 2005»
14 years 1 months ago
Detecting group activities using rigidity of formation
Most work in human activity recognition is limited to relatively simple behaviors like sitting down, standing up or other dramatic posture changes. Very little has been achieved i...
Saad M. Khan, Mubarak Shah
EMMCVPR
2005
Springer
14 years 1 months ago
Object Categorization by Compositional Graphical Models
This contribution proposes a compositionality architecture for visual object categorization, i.e., learning and recognizing multiple visual object classes in unsegmented, cluttered...
Björn Ommer, Joachim M. Buhmann
COMPSAC
2002
IEEE
14 years 19 days ago
New Model and Scheduling Protocol for Transactional Workflows
A transactional workflow is composed of traditional flat transactions, and its execution has relaxed transactional atomicity. Due to different termination characteristics of trans...
Ke Ding, Beihong Jin, Jun Wei, Yulin Feng
AAAI
2006
13 years 9 months ago
On Strictly Competitive Multi-Player Games
We embark on an initial study of a new class of strategic (normal-form) games, so-called ranking games, in which the payoff to each agent solely depends on his position in a ranki...
Felix Brandt, Felix A. Fischer, Yoav Shoham