Sciweavers

766 search results - page 128 / 154
» Detecting modifications in paper documents: a coding approac...
Sort
View
CCS
2010
ACM
13 years 9 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
IOLTS
2006
IEEE
103views Hardware» more  IOLTS 2006»
14 years 3 months ago
Designing Robust Checkers in the Presence of Massive Timing Errors
So far, performance and reliability of circuits have been determined by worst-case characterization of silicon and environmental noise. As new deep sub-micron technologies exacerb...
Frederic Worm, Patrick Thiran, Paolo Ienne
CCS
2009
ACM
14 years 9 months ago
Automatic discovery of botnet communities on large-scale communication networks
Botnets are networks of compromised computers infected with malicious code that can be controlled remotely under a common command and control (C&C) channel. Recognized as one ...
Wei Lu, Mahbod Tavallaee, Ali A. Ghorbani
MICCAI
2009
Springer
14 years 6 months ago
A Robust Solution to Multi-modal Image Registration by Combining Mutual Information with Multi-scale Derivatives
In this paper we present a novel method for performing image registration of different modalities. Mutual Information (MI) is an established method for performing such registration...
Philip A. Legg, Paul L. Rosin, A. David Marshall, ...
INFOCOM
1998
IEEE
14 years 1 months ago
TCP Fast Recovery Strategies: Analysis and Improvements
This paper suggests that, to match an ideal Internet gateway which rigorously enforces fair sharing among competing TCP connections, an ideal TCP sender should possess two propert...
Dong Lin, H. T. Kung