Sciweavers

21319 search results - page 4242 / 4264
» An Approach for Method Reengineering
Sort
View
117
Voted
ACSAC
2010
IEEE
15 years 21 days ago
Comprehensive shellcode detection using runtime heuristics
A promising method for the detection of previously unknown code injection attacks is the identification of the shellcode that is part of the attack vector using payload execution....
Michalis Polychronakis, Kostas G. Anagnostakis, Ev...
137
Voted
BMVC
2010
15 years 20 days ago
Background Modelling on Tensor Field for Foreground Segmentation
The paper proposes a new method to perform foreground detection by means of background modeling using the tensor concept. Sometimes, statistical modelling directly on image values...
Rui Caseiro, Jorge Batista, Pedro Martins
CONEXT
2010
ACM
15 years 20 days ago
NEVERMIND, the problem is already fixed: proactively detecting and troubleshooting customer DSL problems
Traditional DSL troubleshooting solutions are reactive, relying mainly on customers to report problems, and tend to be labor-intensive, time consuming, prone to incorrect resoluti...
Yu Jin, Nick G. Duffield, Alexandre Gerber, Patric...
160
Voted
EMISA
2010
Springer
15 years 20 days ago
Supporting ad hoc Analyses on Enterprise Models
Abstract: Enterprises are socio technical systems whose management involves multiple stakeholders each demanding for a distinct perspective on the enterprise. A large number of mod...
Sabine Buckl, Jens Gulden, Christian M. Schweda
136
Voted
GLOBECOM
2010
IEEE
15 years 19 days ago
Column Generation for Dimensioning Resilient Optical Grid Networks with Relocation
Nowadays, the Quality of Service (QoS) in Optical Grids has become a key issue. An important QoS factor is the resiliency, namely the ability to survive from certain network failur...
Brigitte Jaumard, Jens Buysse, Ali Shaikh, Marc De...
« Prev « First page 4242 / 4264 Last » Next »