Sciweavers

761 search results - page 121 / 153
» Reverse engineering MAC
Sort
View
ECCV
1998
Springer
14 years 9 months ago
Faithful Least-Squares Fitting of Spheres, Cylinders, Cones and Tori for Reliable Segmentation
Abstract. This paper addresses a problem arising in the reverse engineering of solid models from depth-maps. We wish to identify and fit surfaces of known type wherever these are a...
A. David Marshall, Gábor Lukács, Ral...
ICFP
2008
ACM
14 years 8 months ago
Report on the tenth ICFP programming contest
The Tenth Annual ICFP Programming Contest was a 72-hour contest held July 20?23 2007 and organised in conjunction with the 12th ACM SIGPLAN International Conference on Functional ...
Alexey Rodriguez, Andres Löh, Arie Middelkoop...
ICFP
2004
ACM
14 years 8 months ago
Searching for deadlocks while debugging concurrent haskell programs
This paper presents an approach to searching for deadlocks in Concurrent Haskell programs. The search is based on a redefinition of the IO monad which allows the reversal of Concu...
Jan Christiansen, Frank Huch
ICCD
2007
IEEE
140views Hardware» more  ICCD 2007»
14 years 4 months ago
A low overhead hardware technique for software integrity and confidentiality
Software integrity and confidentiality play a central role in making embedded computer systems resilient to various malicious actions, such as software attacks; probing and tamper...
Austin Rogers, Milena Milenkovic, Aleksandar Milen...
CVPR
2010
IEEE
14 years 4 months ago
The Role of Features, Algorithms and Data in Visual Recognition
There are many computer vision algorithms developed for visual (scene and object) recognition. Some systems focus on involved learning algorithms, some leverage millions of trainin...
Devi Parikh and C. Lawrence Zitnick