Sciweavers

2624 search results - page 478 / 525
» The 2LIP model and its implementations
Sort
View
SAC
2006
ACM
14 years 2 months ago
Adapting software components by structure fragmentation
We present in this paper an approach aiming at adapting software components. It focuses on adapting component structures instead of adapting component services. Among the motivati...
Gautier Bastide, Abdelhak Seriai, Mourad Oussalah
CVPR
2008
IEEE
14 years 2 months ago
General Constraints for Batch Multiple-Target Tracking Applied to Large-Scale Videomicroscopy
While there is a large class of Multiple-Target Tracking (MTT) problems for which batch processing is possible and desirable, batch MTT remains relatively unexplored in comparis...
Kevin Smith, Alan Carleton, Vincent Lepetit
3DIM
2005
IEEE
14 years 2 months ago
Simultaneous Determination of Registration and Deformation Parameters among 3D Range Images
Conventional registration algorithms are mostly concerned with rigid-body transformation parameters between a pair of 3D range images. Our proposed framework aims to determine, in...
Tomohito Masuda, Yuichiro Hirota, Katsushi Ikeuchi...
ACSAC
2005
IEEE
14 years 2 months ago
A Host-Based Approach to Network Attack Chaining Analysis
The typical means by which an attacker breaks into a network is through a chain of exploits, where each exploit in the chain lays the groundwork for subsequent exploits. Such a ch...
Paul Ammann, Joseph Pamula, Julie A. Street, Ronal...
ACSC
2005
IEEE
14 years 2 months ago
Flexible Exclusion Control for Composite Objects
We present a simple approach for implementing flexible locking strategies in a system of components, which may themselves be composite objects. The approach is flexible in that a ...
Abdelsalam Shanneb, John Potter