Sciweavers

766 search results - page 71 / 154
» Detecting modifications in paper documents: a coding approac...
Sort
View
ACSAC
2010
IEEE
13 years 7 months ago
Comprehensive shellcode detection using runtime heuristics
A promising method for the detection of previously unknown code injection attacks is the identification of the shellcode that is part of the attack vector using payload execution....
Michalis Polychronakis, Kostas G. Anagnostakis, Ev...
ICDAR
2007
IEEE
14 years 3 months ago
Toponym Recognition in Scanned Color Topographic Maps
Topographic paper maps are a common support for geographical information. In the field of document analysis of this kind of support, this paper proposes an automatic approach to ...
Joachim Pouderoux, Jean-Christophe Gonzato, A. Per...
KBSE
2009
IEEE
14 years 3 months ago
Symbolic Deadlock Analysis in Concurrent Libraries and Their Clients
Methods in object-oriented concurrent libraries hide internal synchronization details. However, information hiding may result in clients causing thread safety violations by invoki...
Jyotirmoy V. Deshmukh, E. Allen Emerson, Sriram Sa...
EMNLP
2008
13 years 10 months ago
Relative Rank Statistics for Dialog Analysis
We introduce the relative rank differential statistic which is a non-parametric approach to document and dialog analysis based on word frequency rank-statistics. We also present a...
Juan Huerta
STVR
2002
111views more  STVR 2002»
13 years 8 months ago
Can fault-exposure-potential estimates improve the fault detection abilities of test suites?
Code-coverage-based test data adequacy criteria typically treat all coverable code elements (such as statements, basic blocks, or outcomes of decisions) as equal. In practice, how...
Wei Chen, Roland H. Untch, Gregg Rothermel, Sebast...