Sciweavers

458 search results - page 73 / 92
» Automatic Evaluation of Intrusion Detection Systems
Sort
View
JOT
2010
130views more  JOT 2010»
13 years 8 months ago
Test Case Generation Based on State and Activity Models
Abstract We propose a novel testing technique for object-oriented programs. Based on the state and activity models of a system, we construct an intermediate representation, which w...
Santosh Kumar Swain, Durga Prasad Mohapatra, Rajib...
ICPR
2008
IEEE
14 years 4 months ago
Retinal vessel tree segmentation using a deformable contour model
This paper presents an improved version of our specific methodology to detect the vessel tree in retinal angiographies. The automatic analysis of retinal vessel tree facilitates ...
Lucia Espona, María J. Carreira, Manuel Fra...
ACSAC
2008
IEEE
14 years 4 months ago
Execution Trace-Driven Automated Attack Signature Generation
In its most general form, an attack signature is a program that can correctly determine if an input network packet sequence can successfully attack a protected network application...
Susanta Nanda, Tzi-cker Chiueh
MONET
2007
95views more  MONET 2007»
13 years 9 months ago
A Pervasive Computing System for the Operating Room of the Future
We describe a prototype Context Aware Perioperative Information System to capture and interpret data in an operating room of the future. The captured data is used to construct the...
Sheetal K. Agarwal, Anupam Joshi, Timothy W. Finin...
EC
2008
174views ECommerce» more  EC 2008»
13 years 9 months ago
Automated Design of Image Operators that Detect Interest Points
This work describes how evolutionary computation can be used to synthesize lowlevel image operators that detect interesting points on digital images. Interest point detection is a...
Leonardo Trujillo, Gustavo Olague