Sciweavers

1927 search results - page 112 / 386
» Modeling the Evolution of Objects in Temporal Information Sy...
Sort
View
USS
2008
13 years 10 months ago
Modeling the Trust Boundaries Created by Securable Objects
One of the most critical steps of any security review involves identifying the trust boundaries that an application is exposed to. While methodologies such as threat modeling can ...
Matt Miller
PAMI
2010
249views more  PAMI 2010»
13 years 6 months ago
Object Detection with Discriminatively Trained Part-Based Models
—We describe an object detection system based on mixtures of multiscale deformable part models. Our system is able to represent highly variable object classes and achieves state-...
Pedro F. Felzenszwalb, Ross B. Girshick, David A. ...
MM
2004
ACM
133views Multimedia» more  MM 2004»
14 years 1 months ago
Interactive retrieval of 3D shape models using physical objects
We present a novel method for interactive retrieval of 3D shapes using physical objects. Our method is based on simple physical 3D interaction with a set of tangible blocks. As th...
Hiroyasu Ichida, Yuichi Itoh, Yoshifumi Kitamura, ...
OOPSLA
2010
Springer
13 years 6 months ago
Cross-language, type-safe, and transparent object sharing for co-located managed runtimes
As software becomes increasingly complex and difficult to analyze, it is more and more common for developers to use high-level, type-safe, object-oriented (OO) programming langua...
Michal Wegiel, Chandra Krintz
SEC
1997
13 years 9 months ago
A formal model to aid documenting and harmonizing of information security requirements
A formal top down model shall be presented to aid documentation and harmonization of information security requirements. The model formalizes layered development of inn security, w...
Jussipekka Leiwo, Yuliang Zheng