Sciweavers

1629 search results - page 67 / 326
» Infeasible Code Detection
Sort
View
ICIP
2002
IEEE
14 years 11 months ago
Dirty-paper trellis codes for watermarking
Informed coding is the practice of representing watermark messages with patterns that are dependent on the cover Works. This requires the use of a dirty-paper code, in which each ...
Gwenaël J. Doërr, Ingemar J. Cox, Matthe...
DATE
2003
IEEE
131views Hardware» more  DATE 2003»
14 years 3 months ago
High Speed and Highly Testable Parallel Two-Rail Code Checker
In this article we propose a high speed and highly testable parallel two-rail code checker, which features a compact structure and is Totally-Self-Checking or Strongly Code-Disjoi...
Martin Omaña, Daniele Rossi, Cecilia Metra
ESANN
2008
13 years 11 months ago
Visual focus with spiking neurons
Attentional focusing can be implemented with a neural field [1], which uses a discharge rate code. As an alternative, we propose in the present work an implementation based on spik...
Sylvain Chevallier, Philippe Tarroux
CVPR
2008
IEEE
15 years 7 days ago
A mobile vision system for robust multi-person tracking
We present a mobile vision system for multi-person tracking in busy environments. Specifically, the system integrates continuous visual odometry computation with tracking-bydetect...
Andreas Ess, Bastian Leibe, Konrad Schindler, Luc ...
ACSAC
2010
IEEE
13 years 8 months ago
Comprehensive shellcode detection using runtime heuristics
A promising method for the detection of previously unknown code injection attacks is the identification of the shellcode that is part of the attack vector using payload execution....
Michalis Polychronakis, Kostas G. Anagnostakis, Ev...