Sciweavers

1760 search results - page 271 / 352
» Program Analysis Using Weighted Pushdown Systems
Sort
View
IPPS
1996
IEEE
14 years 2 months ago
ECO: Efficient Collective Operations for Communication on Heterogeneous Networks
PVM and other distributed computing systems have enabled the use of networks of workstations for parallel computation, but their approach of treating all networks as collections o...
Bruce Lowekamp, Adam Beguelin
MLMI
2004
Springer
14 years 3 months ago
Towards Predicting Optimal Fusion Candidates: A Case Study on Biometric Authentication Tasks
Combining multiple information sources, typically from several data streams is a very promising approach, both in experiments and to some extend in various real-life applications. ...
Norman Poh, Samy Bengio
ICIAR
2005
Springer
14 years 3 months ago
Real-Time and Robust Background Updating for Video Surveillance and Monitoring
Abstract. Background updating is an important aspect of dynamic scene analysis. Two critical problems: sudden camera perturbation and the sleeping person problem, which arise frequ...
Xingzhi Luo, Suchendra M. Bhandarkar
HICSS
2009
IEEE
126views Biometrics» more  HICSS 2009»
14 years 1 months ago
Specifying and Analyzing Workflows for Automated Identification and Data Capture
Humans use computers to carry out tasks that neither is able to do easily alone: humans provide eyes, hands, and judgment while computers provide computation, networking, and stor...
Elsa L. Gunter, Ayesha Yasmeen, Carl A. Gunter, An...
SOSP
2007
ACM
14 years 7 months ago
Bouncer: securing software by blocking bad input
Attackers exploit software vulnerabilities to control or crash programs. Bouncer uses existing software instrumentation techniques to detect attacks and it generates filters auto...
Manuel Costa, Miguel Castro, Lidong Zhou, Lintao Z...