Sciweavers

1295 search results - page 239 / 259
» Automatic Design Pattern Detection
Sort
View
MIDDLEWARE
2007
Springer
14 years 1 months ago
Dynamic multi-process information flow tracking for web application security
Although there is a large body of research on detection and prevention of such memory corruption attacks as buffer overflow, integer overflow, and format string attacks, the web...
Susanta Nanda, Lap-Chung Lam, Tzi-cker Chiueh
RAID
2007
Springer
14 years 1 months ago
SpyShield: Preserving Privacy from Spy Add-Ons
Spyware infections are becoming extremely pervasive, posing a grave threat to Internet users’ privacy. Control of such an epidemic is increasingly difficult for the existing def...
Zhuowei Li, XiaoFeng Wang, Jong Youl Choi
ASPLOS
2010
ACM
13 years 11 months ago
Orthrus: efficient software integrity protection on multi-cores
This paper proposes an efficient hardware/software system that significantly enhances software security through diversified replication on multi-cores. Recent studies show that a ...
Ruirui Huang, Daniel Y. Deng, G. Edward Suh
BMCBI
2007
129views more  BMCBI 2007»
13 years 7 months ago
Exploring inconsistencies in genome-wide protein function annotations: a machine learning approach
Background: Incorrectly annotated sequence data are becoming more commonplace as databases increasingly rely on automated techniques for annotation. Hence, there is an urgent need...
Carson M. Andorf, Drena Dobbs, Vasant Honavar
TCSV
2002
139views more  TCSV 2002»
13 years 7 months ago
Localizing and segmenting text in images and videos
Many images--especially those used for page design on web pages--as well as videos contain visible text. If these text occurrences could be detected, segmented, and recognized auto...
Rainer Lienhart, Axel Wernicke