Sciweavers

20573 search results - page 3945 / 4115
» The Computer's New Clothes
Sort
View
SMI
2006
IEEE
168views Image Analysis» more  SMI 2006»
14 years 4 months ago
Spherical Wavelet Descriptors for Content-based 3D Model Retrieval
The description of 3D shapes with features that possess descriptive power and invariant under similarity transformations is one of the most challenging issues in content based 3D ...
Hamid Laga, Hiroki Takahashi, Masayuki Nakajima
SP
2006
IEEE
132views Security Privacy» more  SP 2006»
14 years 4 months ago
Towards Automatic Generation of Vulnerability-Based Signatures
In this paper we explore the problem of creating vulnerability signatures. A vulnerability signature matches all exploits of a given vulnerability, even polymorphic or metamorphic...
David Brumley, James Newsome, Dawn Xiaodong Song, ...
SYNASC
2006
IEEE
103views Algorithms» more  SYNASC 2006»
14 years 4 months ago
Incremental Deterministic Planning
We present a new planning algorithm that formulates the planning problem as a counting satisfiability problem in which the number of available solutions guides the planner determ...
Stefan Andrei, Wei-Ngan Chin, Martin C. Rinard
WCRE
2006
IEEE
14 years 4 months ago
Animated Visualization of Software History using Evolution Storyboards
The understanding of the structure of a software system can be improved by analyzing the system’s evolution during development. Visualizations of software history that provide o...
Dirk Beyer, Ahmed E. Hassan
WIOPT
2006
IEEE
14 years 4 months ago
Analytical modeling of ad hoc networks that utilize space-time coding
— This paper presents the first analytical model for ad hoc networks equipped with multiple-input multiple-output (MIMO) radios using space-time coding (STC) that considers the ...
Marcelo M. Carvalho, J. J. Garcia-Luna-Aceves
« Prev « First page 3945 / 4115 Last » Next »