Sciweavers

914 search results - page 113 / 183
» Mean Shift Analysis and Applications
Sort
View
EUROSYS
2008
ACM
14 years 7 months ago
Eudaemon: involuntary and on-demand emulation against zero-day exploits
Eudaemon is a technique that aims to blur the borders between protected and unprotected applications, and brings together honeypot technology and end-user intrusion detection and ...
Georgios Portokalidis, Herbert Bos
BMCBI
2008
259views more  BMCBI 2008»
13 years 10 months ago
DISCLOSE : DISsection of CLusters Obtained by SEries of transcriptome data using functional annotations and putative transcripti
Background: A typical step in the analysis of gene expression data is the determination of clusters of genes that exhibit similar expression patterns. Researchers are confronted w...
Evert-Jan Blom, Sacha A. F. T. van Hijum, Klaas J....
ICIAR
2009
Springer
14 years 4 months ago
Interacting with Digital Signage Using Hand Gestures
Abstract. Digital signage is a very attractive medium for advertisement and general communications in public open spaces. In order to add interaction capabilities to digital signag...
Qing Chen, François Malric, Yi Zhang, Muham...
CIVR
2007
Springer
132views Image Analysis» more  CIVR 2007»
14 years 4 months ago
Demonstration of assembly work using augmented reality
In this paper, we describe the demonstration system in which a wooden 3D puzzle is assembled using an augmented reality system. The 3D puzzle describes a simplified assembly task ...
Tapio Salonen, Juha Sääski, Mika Hakkara...
SOFSEM
2007
Springer
14 years 4 months ago
Separation of Concerns and Consistent Integration in Requirements Modelling
Due to their increasing complexity, design of software systems is not becoming easier. Furthermore, modern applications ranging from enterprise to embedded systems require very hig...
Xin Chen, Zhiming Liu, Vladimir Mencl