Sciweavers

409 search results - page 58 / 82
» Human Motion Analysis: A Review
Sort
View
USS
2010
13 years 6 months ago
VEX: Vetting Browser Extensions for Security Vulnerabilities
The browser has become the de facto platform for everyday computation. Among the many potential attacks that target or exploit browsers, vulnerabilities in browser extensions have...
Sruthi Bandhakavi, Samuel T. King, P. Madhusudan, ...
ICRA
2007
IEEE
175views Robotics» more  ICRA 2007»
14 years 3 months ago
Visual Servoing in Non-Rigid Environments: A Space-Time Approach
— Most robotic vision algorithms are proposed by envisaging robots operating in structured environments where the world is assumed to be rigid. These algorithms fail to provide o...
D. Santosh, C. V. Jawahar
GD
2005
Springer
14 years 2 months ago
Network Analysis and Visualisation
A workshop on Network Analysis and Visualisation was held on September 11, 2005 in Limerick Ireland, in conjunction with 2005 Graph Drawing conference. This report review the backg...
Seok-Hee Hong
BMCBI
2006
178views more  BMCBI 2006»
13 years 9 months ago
Correlation analysis of two-dimensional gel electrophoretic protein patterns and biological variables
Background: Two-dimensional gel electrophoresis (2DE) is a powerful technique to examine post-translational modifications of complexly modulated proteins. Currently, spot detectio...
Werner W. V. B. Van Belle, Nina N. A. Anensen, Ing...
ICS
2005
Tsinghua U.
14 years 2 months ago
What is worth learning from parallel workloads?: a user and session based analysis
Learning useful and predictable features from past workloads and exploiting them well is a major source of improvement in many operating system problems. We review known parallel ...
Julia Zilber, Ofer Amit, David Talby