Sciweavers

1636 search results - page 52 / 328
» Detecting similar software applications
Sort
View
HOTSWUP
2009
ACM
14 years 1 months ago
An Implementation of the Linux Software Repository Model for Other Operating Systems
Year after year, the frequency of updated releases of software continues to increase. Without an automated install process, the result is either that a system installs software wi...
Neil McNab, Anthony Bryan
CCS
2008
ACM
13 years 10 months ago
Towards automatic reverse engineering of software security configurations
The specifications of an application's security configuration are crucial for understanding its security policies, which can be very helpful in security-related contexts such...
Rui Wang 0010, XiaoFeng Wang, Kehuan Zhang, Zhuowe...
ICMCS
2007
IEEE
170views Multimedia» more  ICMCS 2007»
14 years 3 months ago
Video Copy Detection on the Internet: The Challenges of Copyright and Multiplicity
This paper presents applications for dealing with videos on the web, using an efficient technique for video copy detection in large archives. Managing videos on the web is the so...
Julien Law-To, Valérie Gouet-Brunet, Olivie...
PST
2004
13 years 10 months ago
Detection of New Malicious Code Using N-grams Signatures
Signature-based malicious code detection is the standard technique in all commercial anti-virus software. This method can detect a virus only after the virus has appeared and cause...
Tony Abou-Assaleh, Nick Cercone, Vlado Keselj, Ray...
ICDE
2008
IEEE
232views Database» more  ICDE 2008»
14 years 10 months ago
Continuous Content-Based Copy Detection over Streaming Videos
Digital videos are increasingly adopted in various multimedia applications where they are usually broadcasted or transmitted as video streams. Continuously monitoring copies on the...
Ying Yan, Beng Chin Ooi, Aoying Zhou