Sciweavers

766 search results - page 112 / 154
» Detecting modifications in paper documents: a coding approac...
Sort
View
ACSAC
2009
IEEE
14 years 3 months ago
FPValidator: Validating Type Equivalence of Function Pointers on the Fly
—Validating function pointers dynamically is very useful for intrusion detection since many runtime attacks exploit function pointer vulnerabilities. Most current solutions tackl...
Hua Wang, Yao Guo, Xiangqun Chen
FGR
1998
IEEE
203views Biometrics» more  FGR 1998»
14 years 1 months ago
Automated Facial Expression Recognition Based on FACS Action Units
Automated recognition of facial expression is an important addition to computer vision research because of its relevance to the study of psychological phenomena and the developmen...
James Jenn-Jier Lien, Takeo Kanade, Jeffrey F. Coh...
WCRE
2005
IEEE
14 years 2 months ago
Enhancing Security Using Legality Assertions
Buffer overflows have been the most common form of security vulnerability in the past decade. A number of techniques have been proposed to address such attacks. Some are limited t...
Lei Wang, James R. Cordy, Thomas R. Dean
APWEB
2003
Springer
14 years 2 months ago
Extracting Content Structure for Web Pages Based on Visual Representation
Abstract. A new web content structure based on visual representation is proposed in this paper. Many web applications such as information retrieval, information extraction and auto...
Deng Cai, Shipeng Yu, Ji-Rong Wen, Wei-Ying Ma
DATE
2006
IEEE
202views Hardware» more  DATE 2006»
14 years 3 months ago
Automatic systemC design configuration for a faster evaluation of different partitioning alternatives
In this paper we present a methodology that is based on SystemC [1] for rapid prototyping to greatly enhance and accelerate the exploration of complex systems to optimize the syst...
Nico Bannow, Karsten Haug, Wolfgang Rosenstiel