Sciweavers

376 search results - page 64 / 76
» Feedback-Directed Random Test Generation
Sort
View
EUROMICRO
2005
IEEE
14 years 1 months ago
Software Security Analysis - Execution Phase Audit
Code revision of a leading telecom product was performed, combining manual audit and static analysis tools. On average, one exploitable vulnerability was found for every 4000 line...
Bengt Carlsson, Dejan Baca
IH
2005
Springer
14 years 1 months ago
Embedding Covert Channels into TCP/IP
It is commonly believed that steganography within TCP/IP is easily achieved by embedding data in header fields seemingly filled with “random” data, such as the IP identifier...
Steven J. Murdoch, Stephen Lewis
SIBGRAPI
2000
IEEE
14 years 5 days ago
An Off-Line Signature Verification System using Hidden Markov Model and Cross-Validation
This work has as main objective to present an off-line signature verification system. It is basically divided into three parts. The first one demonstrates a pre-processing process,...
Edson J. R. Justino, Abdenaim El Yacoubi, Fl&aacut...
3DIM
2007
IEEE
13 years 11 months ago
Estimating the Location of a Camera with Respect to a 3D Model
An algorithm is presented to estimate the position of a hand-held camera with respect to a 3d world model constructed from range data and color imagery. Little prior knowledge is ...
Gehua Yang, Jacob Becker, Charles V. Stewart
EMO
2006
Springer
113views Optimization» more  EMO 2006»
13 years 11 months ago
Prediction-Based Population Re-initialization for Evolutionary Dynamic Multi-objective Optimization
Abstract. Optimization in changing environment is a challenging task, especially when multiple objectives are to be optimized simultaneously. The basic idea to address dynamic opti...
Aimin Zhou, Yaochu Jin, Qingfu Zhang, Bernhard Sen...