Sciweavers

866 search results - page 109 / 174
» A Formal Investigation of
Sort
View
SP
2006
IEEE
132views Security Privacy» more  SP 2006»
14 years 4 months ago
Towards Automatic Generation of Vulnerability-Based Signatures
In this paper we explore the problem of creating vulnerability signatures. A vulnerability signature matches all exploits of a given vulnerability, even polymorphic or metamorphic...
David Brumley, James Newsome, Dawn Xiaodong Song, ...
ICDE
2008
IEEE
158views Database» more  ICDE 2008»
14 years 11 months ago
CARE: Finding Local Linear Correlations in High Dimensional Data
Finding latent patterns in high dimensional data is an important research problem with numerous applications. Existing approaches can be summarized into 3 categories: feature selec...
Xiang Zhang, Feng Pan, Wei Wang
ICDE
2002
IEEE
143views Database» more  ICDE 2002»
14 years 11 months ago
Discovering Similar Multidimensional Trajectories
We investigate techniques for analysis and retrieval of object trajectories in a two or three dimensional space. Such kind of data usually contain a great amount of noise, that ma...
Michail Vlachos, Dimitrios Gunopulos, George Kolli...
ICPR
2008
IEEE
14 years 11 months ago
Multifractality in arterial pulse
Extensive research has been done to show that heartbeats are composed of the interaction of many physiological components operating on different time scales, with nonlinear and se...
Aniruddha J. Joshi, Bhaskar D. Kulkarni, Sharat Ch...
SIGSOFT
2008
ACM
14 years 10 months ago
Using assertions to help end-user programmers create dependable web macros
Web macros give web browser users ways to "program" tedious tasks, allowing those tasks to be repeated more quickly and reliably than when performed by hand. Web macros ...
Andhy Koesnandar, Sebastian G. Elbaum, Gregg Rothe...