Sciweavers

13618 search results - page 2629 / 2724
» The Newton Operating System
Sort
View
3DGIS
2006
Springer
14 years 4 months ago
Digital Terrain Models Derived from SRTM Data and Kriging
The objective of this work is to define procedures to improve spatial resolution of SRTM data and to evaluate their applicability in the Serra Negra region, in the district of Pat...
T. Bernardes, I. Gontijo, H. Andrade, T. G. C. Vie...
ACCV
2006
Springer
14 years 4 months ago
A Multiscale Co-linearity Statistic Based Approach to Robust Background Modeling
Background subtraction is an essential task in several static camera based computer vision systems. Background modeling is often challenged by spatio-temporal changes occurring due...
Prithwijit Guha, Dibyendu Palai, K. S. Venkatesh, ...
ACMSE
2006
ACM
14 years 4 months ago
Static analysis of anomalies and security vulnerabilities in executable files
Software researchers have already developed static code security checkers to parse through and scan source code files, looking for security vulnerabilities [8, 9]. What about exec...
Jay-Evan J. Tevis, John A. Hamilton Jr.
ASPLOS
2006
ACM
14 years 4 months ago
Improving software security via runtime instruction-level taint checking
Current taint checking architectures monitor tainted data usage mainly with control transfer instructions. An alarm is raised once the program counter becomes tainted. However, su...
Jingfei Kong, Cliff Changchun Zou, Huiyang Zhou
DOCENG
2006
ACM
14 years 4 months ago
Content based SMS spam filtering
In the recent years, we have witnessed a dramatic increment in the volume of spam email. Other related forms of spam are increasingly revealing as a problem of importance, special...
José María Gómez Hidalgo, Gui...
« Prev « First page 2629 / 2724 Last » Next »