Sciweavers

314 search results - page 53 / 63
» An Evaluation of the Effectiveness of Measurement-based Anom...
Sort
View
DIMVA
2009
13 years 8 months ago
Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks
Drive-by download attacks are among the most common methods for spreading malware today. These attacks typically exploit memory corruption vulnerabilities in web browsers and brows...
Manuel Egele, Peter Wurzinger, Christopher Kruegel...
CCE
2005
13 years 7 months ago
On-line monitoring of a sugar crystallization process
The present paper reports a comparative evaluation of four multivariate statistical process control (SPC) techniques for the on-line monitoring of an industrial sugar crystallizat...
A. Simoglou, Petia Georgieva, E. B. Martin, A. J. ...
SIGSOFT
2002
ACM
14 years 8 months ago
Invariant inference for static checking
Static checking can verify the absence of errors in a program, but often requires written annotations or specifications. As a result, static checking can be difficult to use effec...
Jeremy W. Nimmer, Michael D. Ernst
ICB
2009
Springer
158views Biometrics» more  ICB 2009»
13 years 5 months ago
3D Face Recognition Using Joint Differential Invariants
Stemming from a sound mathematical framework dating back to the beginning of the 20th century, this paper introduces a novel approach for 3D face recognition. The proposed techniqu...
Marinella Cadoni, Manuele Bicego, Enrico Grosso
VCIP
2003
118views Communications» more  VCIP 2003»
13 years 9 months ago
Object and event recognition for stroke rehabilitation
Stroke is a major cause of disability and health care expenditure around the world. Existing stroke rehabilitation methods can be effective but are costly and need to be improved....
Ahmed Ghali, Andrew S. Cunningham, Tony P. Pridmor...