Sciweavers

250 search results - page 40 / 50
» Hierarchical Program Representation for Program Element Matc...
Sort
View
ICIP
2007
IEEE
14 years 10 months ago
A New Descriptor for 2D Depth Image Indexing and 3D Model Retrieval
We present here a new descriptor for depth images adapted to 2D/3D model matching and retrieving. We propose a representation of a 3D model by 20 depth images rendered from the ve...
Mohamed Chaouch, Anne Verroust-Blondet
ICALP
2005
Springer
14 years 2 months ago
Facility Location in Sublinear Time
Abstract. In this paper we present a randomized constant factor approximation algorithm for the problem of computing the optimal cost of the metric Minimum Facility Location proble...
Mihai Badoiu, Artur Czumaj, Piotr Indyk, Christian...
SP
2006
IEEE
132views Security Privacy» more  SP 2006»
14 years 2 months ago
Towards Automatic Generation of Vulnerability-Based Signatures
In this paper we explore the problem of creating vulnerability signatures. A vulnerability signature matches all exploits of a given vulnerability, even polymorphic or metamorphic...
David Brumley, James Newsome, Dawn Xiaodong Song, ...
CORR
2008
Springer
142views Education» more  CORR 2008»
13 years 8 months ago
Declarative Combinatorics: Boolean Functions, Circuit Synthesis and BDDs in Haskell
We describe Haskell implementations of interesting combinatorial generation algorithms with focus on boolean functions and logic circuit representations. First, a complete exact c...
Paul Tarau
ICAT
2006
IEEE
14 years 2 months ago
An Animation System for Imitation of Object Grasping in Virtual Reality
Interactive virtual characters are nowadays commonplace in games, animations, and Virtual Reality (VR) applications. However, relatively few work has so far considered the animatio...
Matthias Weber, Guido Heumer, Heni Ben Amor, Bernh...