Sciweavers

727 search results - page 46 / 146
» Making Distortions Comprehensible
Sort
View
PASTE
2004
ACM
14 years 1 months ago
Resolving and applying constraint queries on context-sensitive analyses
A context-sensitive analysis is an analysis in which program elements are assigned sets of properties that depend upon the context in which they occur. For analyses on imperative ...
James Ezick
FC
2010
Springer
171views Cryptology» more  FC 2010»
13 years 11 months ago
The Phish-Market Protocol: Securely Sharing Attack Data between Competitors
A key way in which banks mitigate the effects of phishing is to remove fraudulent websites or suspend abusive domain names. This ‘take-down’ is often subcontracted to special...
Tal Moran, Tyler Moore
BMCBI
2004
112views more  BMCBI 2004»
13 years 7 months ago
MuTrack: a genome analysis system for large-scale mutagenesis in the mouse
Background: Modern biological research makes possible the comprehensive study and development of heritable mutations in the mouse model at high-throughput. Using techniques spanni...
Erich J. Baker, Leslie Galloway, Barbara Jackson, ...
ICCV
2009
IEEE
3166views Computer Vision» more  ICCV 2009»
14 years 11 months ago
Detection and Removal of Chromatic Moving Shadows in Surveillance Scenarios
Segmentation in the surveillance domain has to deal with shadows to avoid distortions when detecting moving objects. Most segmentation approaches dealing with shadow detection are ...
Ivan Huerta, Michael Holte, Thomas Moeslund, and J...
SASN
2006
ACM
14 years 1 months ago
RANBAR: RANSAC-based resilient aggregation in sensor networks
We present a novel outlier elimination technique designed for sensor networks. This technique is called RANBAR and it is based on the RANSAC (RANdom SAmple Consensus) paradigm, wh...
Levente Buttyán, Péter Schaffer, Ist...