Sciweavers

3686 search results - page 41 / 738
» Comprehensive comprehensions
Sort
View
ACSAC
2010
IEEE
13 years 5 months ago
Comprehensive shellcode detection using runtime heuristics
A promising method for the detection of previously unknown code injection attacks is the identification of the shellcode that is part of the attack vector using payload execution....
Michalis Polychronakis, Kostas G. Anagnostakis, Ev...
MICRO
2010
IEEE
161views Hardware» more  MICRO 2010»
13 years 5 months ago
AtomTracker: A Comprehensive Approach to Atomic Region Inference and Violation Detection
A particularly insidious type of concurrency bug is atomicity violations. While there has been substantial work on automatic detection of atomicity violations, each existing techn...
Abdullah Muzahid, Norimasa Otsuki, Josep Torrellas
AND
2009
13 years 5 months ago
A comprehensive evaluation methodology for noisy historical document recognition techniques
In this paper, we propose a new comprehensive methodology in order to evaluate the performance of noisy historical document recognition techniques. We aim to evaluate not only the...
Nikolaos Stamatopoulos, Georgios Louloudis, Basili...
DLOG
2009
13 years 5 months ago
Explaining by Example: Model Exploration for Ontology Comprehension
Abstract. In this paper, we describe an approach for ontology comprehension support called model exploration in which models for ontologies are generated and presented interactivel...
Johannes Bauer, Ulrike Sattler, Bijan Parsia
BMCBI
2010
163views more  BMCBI 2010»
13 years 2 months ago
RISCI - Repeat Induced Sequence Changes Identifier: a comprehensive, comparative genomics-based, in silico subtractive hybridiza
Background -: The availability of multiple whole genome sequences has facilitated in silico identification of fixed and polymorphic transposable elements (TE). Whereas polymorphic...
Vipin Singh, Rakesh K. Mishra