• Publications
  • Influence
High-Resolution Stereo Datasets with Subpixel-Accurate Ground Truth
We present a structured lighting system for creating high-resolution stereo datasets of static indoor scenes with highly accurate ground-truth disparities. The system includes novel techniques forExpand
  • 563
  • 87
Mitosis Detection in Breast Cancer Histology Images via Deep Cascaded Networks
The number of mitoses per tissue area gives an important aggressiveness indication of the invasive breast carcinoma. However, automatic mitosis detection in histology images remains a challengingExpand
  • 137
  • 16
Improving application security with data flow assertions
Resin is a new language runtime that helps prevent security vulnerabilities, by allowing programmers to specify application-level data flow assertions. Resin provides policy objects, whichExpand
  • 192
  • 16
Verdi: a framework for implementing and formally verifying distributed systems
Distributed systems are difficult to implement correctly because they must handle both concurrency and failures: machines may crash at arbitrary points and networks may reorder, drop, or duplicateExpand
  • 193
  • 15
Synthesis of bidirectional texture functions on arbitrary surfaces
The bidirectional texture function (BTF) is a 6D function that can describe textures arising from both spatially-variant surface reflectance and surface mesostructures. In this paper, we present anExpand
  • 307
  • 14
Modeling Spatial-Temporal Clues in a Hybrid Deep Learning Framework for Video Classification
Classifying videos according to content semantics is an important problem with a wide range of applications. In this paper, we propose a hybrid deep learning framework for video classification, whichExpand
  • 270
  • 14
Improving Integer Security for Systems with KINT
Integer errors have emerged as an important threat to systems security, because they allow exploits such as buffer overflow and privilege escalation. This paper presents KINT, a tool that usesExpand
  • 82
  • 14
Linux kernel vulnerabilities: state-of-the-art defenses and open problems
Avoiding kernel vulnerabilities is critical to achieving security of many systems, because the kernel is often part of the trusted computing base. This paper evaluates the current state-of-the-artExpand
  • 107
  • 13
R2: An Application-Level Kernel for Record and Replay
Library-based record and replay tools aim to reproduce an application's execution by recording the results of selected functions in a log and during replay returning the results from the log ratherExpand
  • 163
  • 11
Generalized Displacement Maps
In this paper, we introduce a real-time algorithm to render the rich visual effects of general non-height-field geometric details, known as mesostructure. Our method is based on a five-dimensionalExpand
  • 118
  • 10