Sciweavers

1801 search results - page 19 / 361
» Pointing without a pointer
Sort
View
DIMVA
2010
13 years 9 months ago
HookScout: Proactive Binary-Centric Hook Detection
Abstract. In order to obtain and maintain control, kernel malware usually makes persistent control flow modifications (i.e., installing hooks). To avoid detection, malware develope...
Heng Yin, Pongsin Poosankam, Steve Hanna, Dawn Xia...
ICPR
2000
IEEE
14 years 5 days ago
Modeling Range Images with Bounded Error Triangular Meshes without Optimization
This paper presents a new technique for approximating range images by means of adaptive triangular meshes with a bounded approximation error and without applying optimization. Thi...
Angel Domingo Sappa, Miguel Angel García
3DPVT
2006
IEEE
156views Visualization» more  3DPVT 2006»
14 years 1 months ago
Motion Parallax without Motion Compensation in 3D Cluttered Scenes
When an observer moves through a rigid 3D scene, points that are near to the observer move with a different image velocity than points that are far away. The difference between im...
Michael S. Langer, Vincent Chapdelaine-Couture, Ri...
FORMATS
2006
Springer
13 years 11 months ago
Concurrent Semantics Without the Notions of State or State Transitions
This paper argues that basing the semantics of concurrent systems on the notions of state and state transitions is neither advisable nor necessary. The tendency to do this is deepl...
Edward A. Lee
INFOCOM
2012
IEEE
11 years 10 months ago
Pssst, over here: Communicating without fixed infrastructure
—This paper discusses a way to communicate without relying on fixed infrastructure at some central hub. This can be useful for bootstrapping loosely connected peer-to-peer syste...
Tom Callahan, Mark Allman, Michael Rabinovich