Sciweavers

101 search results - page 19 / 21
» Analysis and Design of Dirty Paper Coding by Transformation ...
Sort
View
ML
2010
ACM
155views Machine Learning» more  ML 2010»
13 years 5 months ago
On the infeasibility of modeling polymorphic shellcode - Re-thinking the role of learning in intrusion detection systems
Current trends demonstrate an increasing use of polymorphism by attackers to disguise their exploits. The ability for malicious code to be easily, and automatically, transformed in...
Yingbo Song, Michael E. Locasto, Angelos Stavrou, ...
PRL
2007
107views more  PRL 2007»
13 years 7 months ago
Robust SS watermarking with improved capacity
Robustness is a key attribute of spread spectrum (SS) watermarking scheme. It is significantly deteriorated if one tries to achieve high embedding rate keeping other parameters u...
Santi P. Maity, Malay K. Kundu, Tirtha S. Das
ECLIPSE
2006
ACM
14 years 1 months ago
XPlainer-Eclipse: explaining XPath within Eclipse
The popularity of XML has motivated the development of novel XML processing tools many of which embed the XPath language for XML querying, transformation, constraint specificatio...
John W. S. Liu, Mariano P. Consens, Flavio Rizzolo
DOCENG
2003
ACM
14 years 21 days ago
Set-at-a-time access to XML through DOM
To support the rapid growth of the web and e-commerce, W3C developed DOM as an application programming interface that the abstract, logical tree structure of an XML document. In t...
Hai Chen, Frank Wm. Tompa
SNPD
2008
13 years 8 months ago
The Implementation and Execution Framework of a Role Model Based Language, EpsilonJ
In the social reality, objects communicate with each other by means of assuming roles to establish collaboration, and then can adaptively change their roles to obtain other intera...
Supasit Monpratarnchai, Tamai Tetsuo