Sciweavers

870 search results - page 101 / 174
» The failure detector abstraction
Sort
View
JMM2
2007
118views more  JMM2 2007»
13 years 9 months ago
Universal Detection of JPEG Steganography
Abstract— In this paper, we present a novel universal approach which consists in exploring statistics in the compressed frequency domain. This approach is motivated by two main c...
Johann Barbier, Eric Filiol, Kichenakoumar Mayoura
ICIAR
2010
Springer
13 years 7 months ago
Adaptive Regularization Parameter for Graph Cut Segmentation
Abstract. Graph cut minimization formulates the segmentation problem as the liner combination of data and smoothness terms. The smoothness term is included in the energy formulatio...
Sema Candemir, Yusuf Sinan Akgul
INFOCOM
2010
IEEE
13 years 7 months ago
Malicious Shellcode Detection with Virtual Memory Snapshots
Abstract—Malicious shellcodes are segments of binary code disguised as normal input data. Such shellcodes can be injected into a target process’s virtual memory. They overwrite...
Boxuan Gu, Xiaole Bai, Zhimin Yang, Adam C. Champi...
MICCAI
2010
Springer
13 years 7 months ago
Fast and Automatic Heart Isolation in 3D CT Volumes: Optimal Shape Initialization
Abstract. Heart isolation (separating the heart from the proximity tissues, e.g., lung, liver, and rib cage) is a prerequisite to clearly visualize the coronary arteries in 3D. Suc...
Yefeng Zheng, Fernando Vega Higuera, Shaohua Kevin...
TAICPART
2010
IEEE
133views Education» more  TAICPART 2010»
13 years 7 months ago
Localizing Defects in Multithreaded Programs by Mining Dynamic Call Graphs
Abstract. Writing multithreaded software for multicore computers confronts many developers with the difficulty of finding parallel programming errors. In the past, most parallel d...
Frank Eichinger, Victor Pankratius, Philipp W. L. ...