Sciweavers

872 search results - page 71 / 175
» Automatic Generation of Detection Algorithms for Design Defe...
Sort
View
CVPR
2012
IEEE
11 years 11 months ago
Detecting texts of arbitrary orientations in natural images
With the increasing popularity of practical vision systems and smart phones, text detection in natural scenes becomes a critical yet challenging task. Most existing methods have f...
Cong Yao, Xiang Bai, Wenyu Liu, Yi Ma, Zhuowen Tu
IJSN
2008
80views more  IJSN 2008»
13 years 9 months ago
Syntax vs. semantics: competing approaches to dynamic network intrusion detection
: Malicious network traffic, including widespread worm activity, is a growing threat to Internet-connected networks and hosts. In this paper, we consider two competing approaches t...
Walter J. Scheirer, Mooi Choo Chuah
ISSRE
2008
IEEE
14 years 3 months ago
Detection and Prediction of Resource-Exhaustion Vulnerabilities
Systems connected to the Internet are highly susceptible to denial-of-service attacks that can compromise service availability, causing damage to customers and providers. Due to e...
João Antunes, Nuno Ferreira Neves, Paulo Ve...
CAV
2011
Springer
253views Hardware» more  CAV 2011»
13 years 15 days ago
HAMPI: A String Solver for Testing, Analysis and Vulnerability Detection
Abstract. Many automatic testing, analysis, and verification techniques for programs can effectively be reduced to a constraint-generation phase followed by a constraint-solving ...
Vijay Ganesh, Adam Kiezun, Shay Artzi, Philip J. G...
BMCBI
2008
126views more  BMCBI 2008»
13 years 9 months ago
FCI: an R-based algorithm for evaluating uncertainty of absolute real-time PCR quantification
Background: FCI is an R code for analyzing data from real-time PCR experiments. This algorithm estimates standard curve features as well as nucleic acid concentrations and confide...
Paolo Verderio, Sara Pizzamiglio, Fabio Gallo, Sim...