Sciweavers

886 search results - page 60 / 178
» From Detecting Errors to Automatically Correcting Them
Sort
View
COMPSAC
2009
IEEE
13 years 11 months ago
GUI-Based Testing of Boundary Overflow Vulnerability
Boundary overflows are caused by violation of constraints, mostly limiting the range of internal values of a program, and can be provoked by an intruder to gain control of or acce...
Tugkan Tuglular, Can A. Muftuoglu, Özgür...
HASE
2008
IEEE
14 years 2 months ago
On the Integrity of Lightweight Checkpoints
This paper proposes a lightweight checkpointing scheme for real-time embedded systems. The goal is to separate concerns by allowing applications to take checkpoints independently ...
Raul Barbosa, Johan Karlsson
CISST
2003
181views Hardware» more  CISST 2003»
13 years 9 months ago
Quadrilateral Signboard Detection and Text Extraction
There are numerous rectangular signboards indoors and outdoors. The information contained in them, such as signs and text, is useful for robot navigation. In this paper, a system ...
Angela Tam, Hua Shen, Jianzhuang Liu, Xiaoou Tang
ICPR
2006
IEEE
14 years 9 months ago
Detection-Assisted Initialization, Adaptation and Fusion of Body Region Trackers for Robust Multiperson Tracking
In this paper, we present a system for simultaneous tracking of multiple persons in a smartroom using multiple cameras. Robust person tracks are created, continuously adapted, and...
Keni Bernardin, Alexander Elbs, Rainer Stiefelhage...
GIS
2008
ACM
14 years 9 months ago
Fast and extensible building modeling from airborne LiDAR data
This paper presents an automatic algorithm which reconstructs building models from airborne LiDAR (light detection and ranging) data of urban areas. While our algorithm inherits t...
Qian-Yi Zhou, Ulrich Neumann