Sciweavers

568 search results - page 63 / 114
» Regular Polygon Detection
Sort
View
SEKE
2010
Springer
13 years 5 months ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li
CVPR
2007
IEEE
14 years 9 months ago
A Closed-form Solution to 3D Reconstruction of Piecewise Planar Objects from Single Images
This paper proposes a new approach to 3D reconstruction of piecewise planar objects based on two image regularities, connectivity and perspective symmetry. First, we formulate the...
Zhenguo Li, Jianzhuang Liu, Xiaoou Tang
ICIP
2000
IEEE
14 years 9 months ago
Image Compression with Geometrical Wavelets
We introduce a sparse image representation that takes advantage of the geometrical regularity of edges in images. A new class of one-dimensional wavelet orthonormal bases, called ...
Erwan Le Pennec, Stéphane Mallat
ICDM
2008
IEEE
123views Data Mining» more  ICDM 2008»
14 years 1 months ago
Mining Periodic Behavior in Dynamic Social Networks
Social interactions that occur regularly typically correspond to significant yet often infrequent and hard to detect interaction patterns. To identify such regular behavior, we p...
Mayank Lahiri, Tanya Y. Berger-Wolf
ICIP
2007
IEEE
14 years 1 months ago
Improved Image Segmentation using Photonic Mixer Devices
Aiming at improving image segmentation and extending regular computer vision algorithms an image sensor, acquiring additional depth information is deployed. The novel Photonic Mix...
Frank Wallhoff, Martin Russ, Gerhard Rigoll, Johan...