Sciweavers

1480 search results - page 290 / 296
» Ants can solve constraint satisfaction problems
Sort
View
SP
2006
IEEE
132views Security Privacy» more  SP 2006»
14 years 4 months ago
Towards Automatic Generation of Vulnerability-Based Signatures
In this paper we explore the problem of creating vulnerability signatures. A vulnerability signature matches all exploits of a given vulnerability, even polymorphic or metamorphic...
David Brumley, James Newsome, Dawn Xiaodong Song, ...
ECCV
2006
Springer
14 years 2 months ago
Segmentation and Guidance of Multiple Rigid Objects for Intra-operative Endoscopic Vision
Abstract. This paper presents an endoscopic vision framework for modelbased 3D guidance of surgical instruments used in robotized laparoscopic surgery. In order to develop such a s...
Christophe Doignon, Florent Nageotte, Michel de Ma...
ICECCS
1995
IEEE
100views Hardware» more  ICECCS 1995»
14 years 2 months ago
POSD-a notation for presenting complex systems of processes
When trying to describe the behaviour of large systems, such as the business processes of large enterprises, we often adopt diagramming techniques based on derivatives of data flo...
Peter Henderson, Graham D. Pratten
TWC
2008
150views more  TWC 2008»
13 years 10 months ago
A Unified Cross-Layer Framework for Resource Allocation in Cooperative Networks
Node cooperation is an emerging and powerful solution that can overcome the limitation of wireless systems as well as improve the capacity of the next generation wireless networks....
Wei Chen, Lin Dai, Khaled Ben Letaief, Zhigang Cao
SIGIR
2011
ACM
13 years 1 months ago
Mining tags using social endorsement networks
Entities on social systems, such as users on Twitter, and images on Flickr, are at the core of many interesting applications: they can be ranked in search results, recommended to ...
Theodoros Lappas, Kunal Punera, Tamás Sarlo...