Sciweavers

1513 search results - page 179 / 303
» Cryptographic Pattern Matching
Sort
View
IEEEMSP
2002
IEEE
138views Multimedia» more  IEEEMSP 2002»
14 years 3 months ago
A review of algorithms for audio fingerprinting
— An audio fingerprint is a content-based compact signature that summarizes an audio recording. Audio Fingerprinting technologies have recently attracted attention since they al...
Pedro Cano, Eloi Batlle, Ton Kalker, Jaap Haitsma
NDSS
2000
IEEE
14 years 2 months ago
A Lightweight Tool for Detecting Web Server Attacks
We present an intrusion-detection tool aimed at protecting web servers, and justify why such a tool is needed. We describe several interesting features, such as the ability to run...
Magnus Almgren, Hervé Debar, Marc Dacier
FLOPS
2006
Springer
14 years 2 months ago
Resource Analysis by Sup-interpretation
We propose a new method to control memory resources by static analysis. For this, we introduce the notion of sup-interpretation which bounds from above the size of function outputs...
Jean-Yves Marion, Romain Péchoux
MPC
2000
Springer
105views Mathematics» more  MPC 2000»
14 years 1 months ago
The Universal Resolving Algorithm: Inverse Computation in a Functional Language
Abstract. We present an algorithm for inverse computation in a rstorder functional language based on the notion of a perfect process tree. The Universal Resolving Algorithm (URA) i...
Sergei M. Abramov, Robert Glück
LICS
1991
IEEE
14 years 1 months ago
Higher-Order Critical Pairs
Abstract. We extend the termination proof methods based on reduction orderings to higher-order rewriting systems `a la Nipkow using higher-order pattern matching for firing rules,...
Tobias Nipkow