Sciweavers

357 search results - page 45 / 72
» Enhanced sharing analysis techniques: a comprehensive evalua...
Sort
View
TACAS
2009
Springer
101views Algorithms» more  TACAS 2009»
14 years 2 months ago
Parametric Trace Slicing and Monitoring
Analysis of execution traces plays a fundamental role in many program analysis approaches. Execution traces are frequently parametric, i.e., they contain events with parameter bind...
Feng Chen, Grigore Rosu
BMCBI
2005
91views more  BMCBI 2005»
13 years 7 months ago
Providing visualisation support for the analysis of anatomy ontology data
Background: Improvements in technology have been accompanied by the generation of large amounts of complex data. This same technology must be harnessed effectively if the knowledg...
Aba-Sah Dadzie, Albert Burger
INFOCOM
2011
IEEE
12 years 11 months ago
Privacy analysis of user association logs in a large-scale wireless LAN
User association logs collected from a large-scale wireless LAN record where and when a user has used the network. Such information plays an important role in wireless network res...
Keren Tan, Guanhua Yan, Jihwang Yeo, David Kotz
ACSAC
2004
IEEE
13 years 11 months ago
Visualizing and Identifying Intrusion Context from System Calls Trace
Anomaly-based Intrusion Detection (AID) techniques are useful for detecting novel intrusions without known signatures. However, AID techniques suffer from higher false alarm rate ...
Zhuowei Li, Amitabha Das
CIVR
2007
Springer
149views Image Analysis» more  CIVR 2007»
14 years 1 months ago
Video copy detection: a comparative study
This paper presents a comparative study of methods for video copy detection. Different state-of-the-art techniques, using various kinds of descriptors and voting functions, are d...
Julien Law-To, Li Chen, Alexis Joly, Ivan Laptev, ...