Sciweavers

6770 search results - page 1194 / 1354
» How GPUs Work
Sort
View
CCS
2007
ACM
14 years 3 months ago
Memsherlock: an automated debugger for unknown memory corruption vulnerabilities
Software vulnerabilities have been the main contributing factor to the Internet security problems such as fast spreading worms. Among these software vulnerabilities, memory corrup...
Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu
CIKM
2007
Springer
14 years 3 months ago
Generalizing from relevance feedback using named entity wildcards
Traditional adaptive filtering systems learn the user’s interests in a rather simple way – words from relevant documents are favored in the query model, while words from irre...
Abhimanyu Lad, Yiming Yang
CIVR
2007
Springer
195views Image Analysis» more  CIVR 2007»
14 years 3 months ago
Towards optimal bag-of-features for object categorization and semantic video retrieval
Bag-of-features (BoF) deriving from local keypoints has recently appeared promising for object and scene classification. Whether BoF can naturally survive the challenges such as ...
Yu-Gang Jiang, Chong-Wah Ngo, Jun Yang 0003
CIVR
2007
Springer
139views Image Analysis» more  CIVR 2007»
14 years 3 months ago
Video search in concept subspace: a text-like paradigm
Though both quantity and quality of semantic concept detection in video are continuously improving, it still remains unclear how to exploit these detected concepts as semantic ind...
Xirong Li, Dong Wang, Jianmin Li, Bo Zhang
CLEAR
2007
Springer
296views Biometrics» more  CLEAR 2007»
14 years 3 months ago
PittPatt Face Detection and Tracking for the CLEAR 2007 Evaluation
Abstract. This paper describes Pittsburgh Pattern Recognition’s participation in the face detection and tracking tasks for the CLEAR 2007 evaluation. Since CLEAR 2006, we have ma...
Michael C. Nechyba, Louis Brandy, Henry Schneiderm...
« Prev « First page 1194 / 1354 Last » Next »