Sciweavers

22121 search results - page 4411 / 4425
» Modeling annotated data
Sort
View
USS
2010
13 years 5 months ago
Toward Automated Detection of Logic Vulnerabilities in Web Applications
Web applications are the most common way to make services and data available on the Internet. Unfortunately, with the increase in the number and complexity of these applications, ...
Viktoria Felmetsger, Ludovico Cavedon, Christopher...
DAGM
2009
Springer
13 years 5 months ago
Combined GKLT Feature Tracking and Reconstruction for Next Best View Planning
Abstract. Guided Kanade-Lucas-Tomasi (GKLT) tracking is a suitable way to incorporate knowledge about camera parameters into the standard KLT tracking approach for feature tracking...
Michael Trummer, Christoph Munkelt, Joachim Denzle...
EDBT
2009
ACM
165views Database» more  EDBT 2009»
13 years 5 months ago
Exploiting the power of relational databases for efficient stream processing
Stream applications gained significant popularity over the last years that lead to the development of specialized stream engines. These systems are designed from scratch with a di...
Erietta Liarou, Romulo Goncalves, Stratos Idreos
ICMI
2009
Springer
196views Biometrics» more  ICMI 2009»
13 years 5 months ago
Communicative gestures in coreference identification in multiparty meetings
During multiparty meetings, participants can use non-verbal modalities such as hand gestures to make reference to the shared environment. Therefore, one hypothesis is that incorpo...
Tyler Baldwin, Joyce Y. Chai, Katrin Kirchhoff
IEEEPACT
2009
IEEE
13 years 5 months ago
Cache Sharing Management for Performance Fairness in Chip Multiprocessors
Resource sharing can cause unfair and unpredictable performance of concurrently executing applications in Chip-Multiprocessors (CMP). The shared last-level cache is one of the mos...
Xing Zhou, Wenguang Chen, Weimin Zheng
« Prev « First page 4411 / 4425 Last » Next »