Sciweavers

6095 search results - page 1175 / 1219
» Learning in Local Search
Sort
View
TIFS
2010
144views more  TIFS 2010»
13 years 8 months ago
Forensic detection of image manipulation using statistical intrinsic fingerprints
—As the use of digital images has increased, so has the means and the incentive to create digital image forgeries. Accordingly, there is a great need for digital image forensic t...
Matthew C. Stamm, K. J. Ray Liu
VIROLOGY
2010
179views more  VIROLOGY 2010»
13 years 8 months ago
Automatic binary deobfuscation
Abstract. This paper gives an overview of our research in the automation of the process of software protection analysis. We will focus more particularly on the problem of obfuscati...
Yoann Guillot, Alexandre Gazet
MOBIHOC
2010
ACM
13 years 7 months ago
Near optimal multi-application allocation in shared sensor networks
Recent years have witnessed the emergence of shared sensor networks as integrated infrastructure for multiple applications. It is important to allocate multiple applications in a ...
You Xu, Abusayeed Saifullah, Yixin Chen, Chenyang ...
ICCAD
2009
IEEE
171views Hardware» more  ICCAD 2009»
13 years 7 months ago
A hybrid local-global approach for multi-core thermal management
Multi-core processors have become an integral part of mainstream high performance computer systems. In parallel, exponentially increasing power density and packaging costs have ne...
Ramkumar Jayaseelan, Tulika Mitra
CVPR
2011
IEEE
13 years 5 months ago
Image Retrieval with Geometry-Preserving Visual Phrases
The most popular approach to large scale image retrieval is based on the bag-of-visual-word (BoV) representation of images. The spatial information is usually reintroduced as a po...
Yimeng Zhang, Zhaoyin Jia, Tsuhan Chen
« Prev « First page 1175 / 1219 Last » Next »