Sciweavers

2560 search results - page 466 / 512
» Analysis Tool for Honeypot Systems
Sort
View
PAMI
2007
138views more  PAMI 2007»
13 years 9 months ago
A Fast Biologically Inspired Algorithm for Recurrent Motion Estimation
—We have previously developed a neurodynamical model of motion segregation in cortical visual area V1 and MT of the dorsal stream. The model explains how motion ambiguities cause...
Pierre Bayerl, Heiko Neumann
PVLDB
2008
124views more  PVLDB 2008»
13 years 9 months ago
DBPubs: multidimensional exploration of database publications
DBPubs is a system for effectively analyzing and exploring the content of database publications by combining keyword search with OLAP-style aggregations, navigation, and reporting...
Akanksha Baid, Andrey Balmin, Heasoo Hwang, Erik N...
IAJIT
2010
87views more  IAJIT 2010»
13 years 8 months ago
A performance comparison of MD5 authenticated routing traffic with EIGRP, RIPv2, and OSPF
: Routing is the process of forwarding data across an inter-network from a designated source to a final destination. Along the way from source to destination, at least one intermed...
Khalid Abu Al-Saud, Hatim Mohd Tahir, Moutaz Saleh...
IWPC
2010
IEEE
13 years 8 months ago
Understanding and Auditing the Licensing of Open Source Software Distributions
—Free and open source software (FOSS) is often distributed in binary packages, sometimes part of GNU/Linux operating system distributions, or part of products distributed/sold to...
Daniel M. Germán, Massimiliano Di Penta, Ju...
JSC
2010
106views more  JSC 2010»
13 years 8 months ago
Verifying pointer safety for programs with unknown calls
We study the automated verification of pointer safety for heap-manipulating imperative programs with unknown procedure calls. Given a Hoare-style partial correctness specificati...
Chenguang Luo, Florin Craciun, Shengchao Qin, Guan...