Sciweavers

663 search results - page 125 / 133
» From P2P to reliable semantic P2P systems
Sort
View
POPL
2012
ACM
12 years 3 months ago
Access permission contracts for scripting languages
The ideal software contract fully specifies the behavior of an operation. Often, in particular in the context of scripting languages, a full specification may be cumbersome to s...
Phillip Heidegger, Annette Bieniusa, Peter Thieman...
CVPR
2008
IEEE
14 years 9 months ago
A mobile vision system for robust multi-person tracking
We present a mobile vision system for multi-person tracking in busy environments. Specifically, the system integrates continuous visual odometry computation with tracking-bydetect...
Andreas Ess, Bastian Leibe, Konrad Schindler, Luc ...
LREC
2010
209views Education» more  LREC 2010»
13 years 9 months ago
Towards a Balanced Named Entity Corpus for Dutch
This paper introduces a new named entity corpus for Dutch. State-of-the-art named entity recognition systems require a substantial annotated corpus to be trained on. Such corpora ...
Bart Desmet, Véronique Hoste
DLS
2009
196views Languages» more  DLS 2009»
13 years 5 months ago
Contracts for first-class modules
Behavioral software contracts express properties concerning the flow of values across component (modules, classes, etc) interfaces. These properties are often beyond the reach of ...
T. Stephen Strickland, Matthias Felleisen
SP
2009
IEEE
262views Security Privacy» more  SP 2009»
14 years 2 months ago
Automatic Reverse Engineering of Malware Emulators
Malware authors have recently begun using emulation technology to obfuscate their code. They convert native malware binaries into bytecode programs written in a randomly generated...
Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffi...