Sciweavers

275 search results - page 37 / 55
» join 2007
Sort
View
DIMVA
2009
13 years 11 months ago
Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks
Drive-by download attacks are among the most common methods for spreading malware today. These attacks typically exploit memory corruption vulnerabilities in web browsers and brows...
Manuel Egele, Peter Wurzinger, Christopher Kruegel...
EJC
2007
13 years 9 months ago
An integrality theorem of root systems
Let Φ be an irreducible root system and ∆ be a base for Φ; it is well known that any root in Φ is an integral combination of the roots in ∆. In comparison to this fact, we ...
A. Bhattacharya, G. R. Vijayakumar
AMC
2005
128views more  AMC 2005»
13 years 9 months ago
A new face recognition method based on SVD perturbation for single example image per person
At present, there are many methods for frontal view face recognition. However, few of them can work well when only one example image per class is available. In this paper, we pres...
Daoqiang Zhang, Songcan Chen, Zhi-Hua Zhou
JDM
2007
56views more  JDM 2007»
13 years 9 months ago
Temporal Aggregation Using a Multidimensional Index
We present a new method for computing temporal aggregation that uses a multidimensional index. The novelty of our method lies in mapping the start time and end time of a temporal ...
Joon-Ho Woo, Byung Suk Lee, Min-Jae Lee, Woong-Kee...
CVPR
2007
IEEE
14 years 12 months ago
Image Classification with Segmentation Graph Kernels
We propose a family of kernels between images, defined as kernels between their respective segmentation graphs. The kernels are based on soft matching of subtree-patterns of the r...
Francis Bach, Zaïd Harchaoui