Sciweavers

1262 search results - page 102 / 253
» Generating instruction sets and microarchitectures from appl...
Sort
View
SP
2006
IEEE
132views Security Privacy» more  SP 2006»
14 years 3 months ago
Towards Automatic Generation of Vulnerability-Based Signatures
In this paper we explore the problem of creating vulnerability signatures. A vulnerability signature matches all exploits of a given vulnerability, even polymorphic or metamorphic...
David Brumley, James Newsome, Dawn Xiaodong Song, ...
SIGGRAPH
1992
ACM
14 years 1 months ago
Generative modeling: a symbolic system for geometric modeling
This paper discusses a new, symbolic approach to geometric modeling called generative modeling. The approach allows specification, rendering, and analysis of a wide variety of sha...
John M. Snyder, James T. Kajiya
VISUALIZATION
2003
IEEE
14 years 2 months ago
Visualizing Industrial CT Volume Data for Nondestructive Testing Applications
This paper describes a set of techniques developed for the visualization of high-resolution volume data generated from industrial computed tomography for nondestructive testing (N...
Runzhen Huang, Kwan-Liu Ma, Patrick S. McCormick, ...
VIS
2008
IEEE
204views Visualization» more  VIS 2008»
14 years 10 months ago
Surface Extraction from Multi-field Particle Volume Data Using Multi-dimensional Cluster Visualization
Data sets resulting from physical simulations typically contain a multitude of physical variables. It is, therefore, desirable that visualization methods take into account the enti...
Lars Linsen, Tran Van Long, Paul Rosenthal, Ste...
KDD
2002
ACM
148views Data Mining» more  KDD 2002»
14 years 9 months ago
Discovering informative content blocks from Web documents
In this paper, we propose a new approach to discover informative contents from a set of tabular documents (or Web pages) of a Web site. Our system, InfoDiscoverer, first partition...
Shian-Hua Lin, Jan-Ming Ho