Sciweavers

910 search results - page 68 / 182
» Fractal-Based Techniques for a Generalized Image Coding Meth...
Sort
View
SIGSOFT
2005
ACM
15 years 9 months ago
PR-Miner: automatically extracting implicit programming rules and detecting violations in large software code
Programs usually follow many implicit programming rules, most of which are too tedious to be documented by programmers. When these rules are violated by programmers who are unawar...
Zhenmin Li, Yuanyuan Zhou
SERSCISA
2009
Springer
15 years 10 months ago
Counteracting Phishing Page Polymorphism: An Image Layout Analysis Approach
Many visual similarity-based phishing page detectors have been developed to detect phishing webpages, however, scammers now create polymorphic phishing pages to breach the defense ...
Ieng-Fat Lam, Wei-Cheng Xiao, Szu-Chi Wang, Kuan-T...
149
Voted
ICPPW
2006
IEEE
15 years 9 months ago
Retargeting Image-Processing Algorithms to Varying Processor Grain Sizes
Embedded computing architectures can be designed to meet a variety of application specific requirements. However, optimized hardware can require compiler support to realize the po...
Sam Sander, Linda M. Wills
CVPR
2008
IEEE
16 years 5 months ago
Intrinsic image decomposition with non-local texture cues
We present a method for decomposing an image into its intrinsic reflectance and shading components. Different from previous work, our method examines texture information to obtain...
Li Shen, Ping Tan, Stephen Lin
137
Voted
MSR
2005
ACM
15 years 9 months ago
Towards a taxonomy of approaches for mining of source code repositories
Source code version repositories provide a treasure of information encompassing the changes introduced in the system throughout its evolution. These repositories are typically man...
Huzefa H. Kagdi, Michael L. Collard, Jonathan I. M...