Sciweavers

910 search results - page 68 / 182
» Fractal-Based Techniques for a Generalized Image Coding Meth...
Sort
View
SIGSOFT
2005
ACM
14 years 3 months ago
PR-Miner: automatically extracting implicit programming rules and detecting violations in large software code
Programs usually follow many implicit programming rules, most of which are too tedious to be documented by programmers. When these rules are violated by programmers who are unawar...
Zhenmin Li, Yuanyuan Zhou
SERSCISA
2009
Springer
14 years 4 months ago
Counteracting Phishing Page Polymorphism: An Image Layout Analysis Approach
Many visual similarity-based phishing page detectors have been developed to detect phishing webpages, however, scammers now create polymorphic phishing pages to breach the defense ...
Ieng-Fat Lam, Wei-Cheng Xiao, Szu-Chi Wang, Kuan-T...
ICPPW
2006
IEEE
14 years 4 months ago
Retargeting Image-Processing Algorithms to Varying Processor Grain Sizes
Embedded computing architectures can be designed to meet a variety of application specific requirements. However, optimized hardware can require compiler support to realize the po...
Sam Sander, Linda M. Wills
CVPR
2008
IEEE
15 years 11 days ago
Intrinsic image decomposition with non-local texture cues
We present a method for decomposing an image into its intrinsic reflectance and shading components. Different from previous work, our method examines texture information to obtain...
Li Shen, Ping Tan, Stephen Lin
MSR
2005
ACM
14 years 3 months ago
Towards a taxonomy of approaches for mining of source code repositories
Source code version repositories provide a treasure of information encompassing the changes introduced in the system throughout its evolution. These repositories are typically man...
Huzefa H. Kagdi, Michael L. Collard, Jonathan I. M...