Sciweavers

739 search results - page 128 / 148
» Information Flow in Credential Systems
Sort
View
USS
2004
13 years 9 months ago
Static Disassembly of Obfuscated Binaries
Disassembly is the process of recovering a symbolic representation of a program's machine code instructions from its binary representation. Recently, a number of techniques h...
Christopher Krügel, William K. Robertson, Fre...
SI3D
2010
ACM
13 years 7 months ago
Interactive painterly stylization of images, videos and 3D animations
We introduce a real-time system that converts images, video, or 3D animation sequences to artistic renderings in various painterly styles. The algorithm, which is entirely execute...
Jingwan Lu, Pedro V. Sander, Adam Finkelstein
DSONLINE
2006
79views more  DSONLINE 2006»
13 years 7 months ago
Integrating Security Policies via Container Portable Interceptors
In the past, it was very common to develop middleware without consideration of security from the very beginning. To integrate security, the middleware that should be protected has...
Tom Ritter, Rudolf Schreiner, Ulrich Lang
JDCTA
2008
110views more  JDCTA 2008»
13 years 7 months ago
Development and Validation of a New Method for Noninvasive Diagnosis of LUTS
Lower urinary tract symptoms (LUTS) affect selfassessed quality of life. The aim of this study is to acquire useful information of LUTS diagnosis thorough uroflow and urophonograp...
Do-Un Jeong, Wan-Young Chung
BC
2004
97views more  BC 2004»
13 years 7 months ago
An elaborated model of fly small-target tracking
Flies have the capability to visually track small moving targets, even across cluttered backgrounds. Previous computational models, based on figure detection (FD) cells identified ...
Charles M. Higgins, Vivek Pant