Sciweavers

752 search results - page 94 / 151
» Finite-State Modeling, Analysis and Testing of System Vulner...
Sort
View
127
Voted
MICCAI
2008
Springer
16 years 4 months ago
Group Statistics of DTI Fiber Bundles Using Spatial Functions of Tensor Measures
We present a framework for hypothesis testing of differences between groups of DTI fiber tracts. An anatomical, tract-oriented coordinate system provides a basis for estimating the...
Casey Goodlett, P. Thomas Fletcher, John H. Gilm...
128
Voted
ICHIT
2009
Springer
15 years 10 months ago
Middleware-based distributed systems software process
Middleware facilitates the development of distributed systems by accommodating heterogeneity, hiding distribution details and providing a set of common and domain specific service...
Liu Jingyong, Zhong Yong, Chen Yong, Zhang Lichen
115
Voted
PDCN
2004
15 years 5 months ago
Design and implementation of a network simulation system
In this paper, an efficient tool has been designed and implemented to design and analyze the communication networks. A network simulator in software is valuable for network manage...
Jae-Weon Choi, Man-Hui Lee
159
Voted
CCS
2007
ACM
15 years 7 months ago
Analyzing network traffic to detect self-decrypting exploit code
Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are...
Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Pu...
CHI
2005
ACM
16 years 4 months ago
WebGazeAnalyzer: a system for capturing and analyzing web reading behavior using eye gaze
Capturing and analyzing the detailed eye movements of a user while reading a web page can reveal much about the ways in which web reading occurs. The WebGazeAnalyzer system descri...
David Beymer, Daniel M. Russell