Sciweavers

280 search results - page 38 / 56
» Constraint Systems for Pattern Analysis of Constraint Logic-...
Sort
View
170
Voted
KES
2005
Springer
15 years 9 months ago
Design of a Digital Forensics Image Mining System
Increasing amount of illicit image data transmitted via the internet has triggered the need to develop effective image mining systems for digital forensics purposes. This paper dis...
Ross Brown, Binh Pham, Olivier Y. de Vel
147
Voted
WICOMM
2010
91views more  WICOMM 2010»
15 years 1 months ago
A sensing-based cognitive coexistence method for interfering infrastructure and ad hoc systems
The rapid proliferation of wireless systems makes interference management more and more important. This paper presents a novel cognitive coexistence framework, which enables an in...
Stefan Geirhofer, Lang Tong, Brian M. Sadler
118
Voted
AOSD
2010
ACM
15 years 10 months ago
Disambiguating aspect-oriented security policies
Many software security policies can be encoded as aspects that identify and guard security-relevant program operations. Bugs in these aspectually-implemented security policies oft...
Micah Jones, Kevin W. Hamlen
121
Voted
INEX
2004
Springer
15 years 8 months ago
Mixture Models, Overlap, and Structural Hints in XML Element Retrieval
We describe the INEX 2004 participation of the Informatics Institute of the University of Amsterdam. We completely revamped our XML retrieval system, now implemented as a mixture l...
Börkur Sigurbjörnsson, Jaap Kamps, Maart...
154
Voted
CCS
2006
ACM
15 years 7 months ago
EXE: automatically generating inputs of death
This paper presents EXE, an effective bug-finding tool that automatically generates inputs that crash real code. Instead of running code on manually or randomly constructed input,...
Cristian Cadar, Vijay Ganesh, Peter M. Pawlowski, ...