Sciweavers

572 search results - page 73 / 115
» A Framework for the Comparison of Complex Patterns
Sort
View
ISW
2004
Springer
15 years 9 months ago
A Model for the Semantics of Attack Signatures in Misuse Detection Systems
Misuse Detection systems identify evidence of attacks by searching for patterns of known attacks (signatures). A main problem in this context is the modeling and specification of a...
Michael Meier
179
Voted
CASES
2007
ACM
15 years 7 months ago
Compiler generation from structural architecture descriptions
With increasing complexity of modern embedded systems, the availability of highly optimizing compilers becomes more and more important. At the same time, application specific inst...
Florian Brandner, Dietmar Ebner, Andreas Krall
APVIS
2008
15 years 5 months ago
MobiVis: A Visualization System for Exploring Mobile Data
The widespread use of mobile devices brings opportunities to capture large-scale, continuous information about human behavior. Mobile data has tremendous value, leading to busines...
Zeqian Shen, Kwan-Liu Ma
106
Voted
PICS
2001
15 years 5 months ago
Measuring Visual Threshold of Inkjet Banding
Banding can be a major defect in inkjet printing. Knowing the visual sensitivity threshold of inkjet banding is therefore useful for understanding and pushing the technological li...
Chengwu Cui, Dingcai Cao, Shaun T. Love
128
Voted
JOC
2008
92views more  JOC 2008»
15 years 3 months ago
Cryptanalysis of an E0-like Combiner with Memory
In this paper, we study an E0-like combiner with memory as the keystream generator. First, we formulate a systematic and simple method to compute correlations of the FSM output seq...
Yi Lu 0002, Serge Vaudenay