Sciweavers

3370 search results - page 495 / 674
» Correlation Embedding Analysis
Sort
View

Publication
148views
14 years 14 days ago
ADSandbox: sandboxing JavaScript to fight malicious websites
We present ADSandbox, an analysis system for malicious websites that focusses on detecting attacks through JavaScript. Since, in contrast to Java, JavaScript does not have any bui...
ETS
2007
IEEE
128views Hardware» more  ETS 2007»
14 years 14 days ago
Selecting Power-Optimal SBST Routines for On-Line Processor Testing
Software-Based Self-Test (SBST) has emerged as an effective strategy for on-line testing of processors integrated in non-safety critical embedded system applications. Among the mo...
Andreas Merentitis, Nektarios Kranitis, Antonis M....
DOCENG
2008
ACM
14 years 14 days ago
A concise XML binding framework facilitates practical object-oriented document engineering
Semantic web researchers tend to assume that XML Schema and OWL-S are the correct means for representing the types, structure, and semantics of XML data used for documents and int...
Andruid Kerne, Zachary O. Toups, Blake Dworaczyk, ...
DICTA
2007
14 years 4 days ago
Simplex Optimisation Initialized by Gaussian Mixture for Active Appearance Models
Active appearance model efficiently aligns objects which are previously modelized in images. We use it for Human Machine Interface (face gesture analysis, lips reading) to modeli...
Yasser Aidarous, Sylvain Le Gallou, Renaud S&eacut...
SETP
2007
14 years 3 days ago
Dimensional Inference Using Symbol Lives
Scientific equations embedded in computer programs must obey the rules for dimensional consistency. Many efforts have been made to enforce these rules within computer programs. So...
Brian Farrimond, John Collins