Sciweavers

3135 search results - page 537 / 627
» Localization Algorithms: Performance Evaluation and Reliabil...
Sort
View
SP
2010
IEEE
140views Security Privacy» more  SP 2010»
14 years 24 days ago
Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries
Abstract—Unfortunately, malicious software is still an unsolved problem and a major threat on the Internet. An important component in the fight against malicious software is the...
Clemens Kolbitsch, Thorsten Holz, Christopher Krue...
IJCNN
2007
IEEE
14 years 3 months ago
Using Artificial Neural Networks and Feature Saliency Techniques for Improved Iris Segmentation
—One of the basic challenges to robust iris recognition is iris segmentation. This paper proposes the use of a feature saliency algorithm and an artificial neural network to perf...
Randy P. Broussard, Lauren R. Kennell, David L. So...
SC
2003
ACM
14 years 2 months ago
Identifying and Exploiting Spatial Regularity in Data Memory References
The growing processor/memory performance gap causes the performance of many codes to be limited by memory accesses. If known to exist in an application, strided memory accesses fo...
Tushar Mohan, Bronis R. de Supinski, Sally A. McKe...
IEEEPACT
1998
IEEE
14 years 1 months ago
Adaptive Scheduling of Computations and Communications on Distributed Memory Systems
Compile-time scheduling is one approach to extract parallelism which has proved effective when the execution behavior is predictable. Unfortunately, the performance of most priori...
Mayez A. Al-Mouhamed, Homam Najjari
ICCV
2005
IEEE
14 years 11 months ago
Probabilistic Contour Extraction Using Hierarchical Shape Representation
In this paper, we address the issue of extracting contour of the object with a specific shape. A hierarchical graphical model is proposed to represent shape variations. A complex ...
Xin Fan, Chun Qi, Dequn Liang, Hua Huang