Sciweavers

458 search results - page 61 / 92
» Automatic Evaluation of Intrusion Detection Systems
Sort
View
CSFW
2007
IEEE
14 years 5 months ago
Creating Vulnerability Signatures Using Weakest Preconditions
Signature-based tools such as network intrusion detection systems are widely used to protect critical systems. Automatic signature generation techniques are needed to enable these...
David Brumley, Hao Wang, Somesh Jha, Dawn Xiaodong...
CVPR
2006
IEEE
14 years 5 months ago
Tracking of Multiple, Partially Occluded Humans based on Static Body Part Detection
Tracking of humans in videos is important for many applications. A major source of difficulty in performing this task is due to inter-human or scene occlusion. We present an appr...
Bo Wu, Ram Nevatia
CHI
2004
ACM
14 years 11 months ago
Automatic support for web user studies with SCONE and TEA
This paper describes the concepts of TEA, a flexible tool that supports user tests by automating repetitive tasks and collecting data of user inputs and actions. TEA was specifica...
Hartmut Obendorf, Harald Weinreich, Torsten Hass
ICDIM
2008
IEEE
14 years 5 months ago
Dynamic detection and administration of materialized views based on the Query Graph Model
Database Management Systems (DBMS) are complex software systems which are used in an increasing number of applications. To obtain the best performance for business relevant applic...
Andreas Lübcke, Ingolf Geist, Ronny Bubke
ECOOP
2010
Springer
14 years 3 months ago
Detecting Missing Method Calls in Object-Oriented Software
When using object-oriented frameworks it is easy to overlook certain important method calls that are required at particular places in code. In this paper, we provide a comprehensiv...
Martin Monperrus, Marcel Bruch, Mira Mezini