Sciweavers

1086 search results - page 198 / 218
» Knowledge-based part correspondence
Sort
View
KDD
2010
ACM
310views Data Mining» more  KDD 2010»
14 years 16 days ago
An integrated machine learning approach to stroke prediction
Stroke is the third leading cause of death and the principal cause of serious long-term disability in the United States. Accurate prediction of stroke is highly valuable for early...
Aditya Khosla, Yu Cao, Cliff Chiung-Yu Lin, Hsu-Ku...
3DPVT
2004
IEEE
231views Visualization» more  3DPVT 2004»
14 years 12 days ago
A Variational Analysis of Shape from Specularities using Sparse Data
Looking around in our every day environment, many of the encountered objects are specular to some degree. Actively using this fact when reconstructing objects from image sequences...
Jan Erik Solem, Henrik Aanæs, Anders Heyden
ACSAC
2004
IEEE
14 years 11 days ago
A Dynamic Technique for Eliminating Buffer Overflow Vulnerabilities (and Other Memory Errors)
Buffer overflow vulnerabilities are caused by programming errors that allow an attacker to cause the program to write beyond the bounds of an allocated memory block to corrupt oth...
Martin C. Rinard, Cristian Cadar, Daniel Dumitran,...
ASIACRYPT
2006
Springer
14 years 11 days ago
On the (In)security of Stream Ciphers Based on Arrays and Modular Addition
Abstract. Stream ciphers play an important role in symmetric cryptology because of their suitability in high speed applications where block ciphers fall short. A large number of fa...
Souradyuti Paul, Bart Preneel
FMICS
2006
Springer
14 years 9 days ago
SAT-Based Verification of LTL Formulas
Abstract. Bounded model checking (BMC) based on satisfiability testing (SAT) has been introduced as a complementary technique to BDDbased symbolic model checking of LTL properties ...
Wenhui Zhang