Sciweavers

448 search results - page 67 / 90
» The Light of Existence
Sort
View
PRL
2008
101views more  PRL 2008»
13 years 5 months ago
Illumination-robust face recognition using ridge regressive bilinear models
The performance of face recognition is greatly affected by illumination changes because intra-person variation of the captured images under different lighting conditions can be mu...
Dongsoo Shin, Hyung-Soo Lee, Daijin Kim
WCRE
2010
IEEE
13 years 5 months ago
Reverse Engineering Self-Modifying Code: Unpacker Extraction
—An important application of binary-level reverse engineering is in reconstructing the internal logic of computer malware. Most malware code is distributed in encrypted (or “pa...
Saumya K. Debray, Jay Patel
WDAG
2010
Springer
168views Algorithms» more  WDAG 2010»
13 years 5 months ago
Fast Randomized Test-and-Set and Renaming
Most people believe that renaming is easy: simply choose a name at random; if more than one process selects the same name, then try again. We highlight the issues that occur when t...
Dan Alistarh, Hagit Attiya, Seth Gilbert, Andrei G...
ICIP
2010
IEEE
13 years 5 months ago
Virtual jewel rendering for augmented reality environments
Virtual Mirrors are augmented reality applications that capture a viewer's image and add 2D or 3D overlaid virtual elements, such as cloth patterns, or replace existing piece...
Peter Eisert, Christian Jacquemin, Anna Hilsmann
PVM
2010
Springer
13 years 5 months ago
Efficient MPI Support for Advanced Hybrid Programming Models
The number of multithreaded Message Passing Interface (MPI) implementations and applications is increasing rapidly. We discuss how multithreaded applications can receive messages o...
Torsten Hoefler, Greg Bronevetsky, Brian Barrett, ...