Sciweavers

3320 search results - page 594 / 664
» Heuristics for the Phylogeny Problem
Sort
View
CCS
2006
ACM
14 years 26 days ago
Replayer: automatic protocol replay by binary analysis
We address the problem of replaying an application dialog between two hosts. The ability to accurately replay application dialogs is useful in many security-oriented applications,...
James Newsome, David Brumley, Jason Franklin, Dawn...
CCS
2006
ACM
14 years 26 days ago
Evading network anomaly detection systems: formal reasoning and practical techniques
Attackers often try to evade an intrusion detection system (IDS) when launching their attacks. There have been several published studies in evasion attacks, some with available to...
Prahlad Fogla, Wenke Lee
FGR
2006
IEEE
121views Biometrics» more  FGR 2006»
14 years 24 days ago
Optimal Hand Gesture Vocabulary Design Using Psycho-Physiological and Technical Factors
A global approach to hand gesture vocabulary design is proposed which includes human as well as technical design factors. The human centered desires of multiple users are implicit...
Helman Stern, Juan P. Wachs, Yael Edan
FOCS
1995
IEEE
14 years 21 days ago
Disjoint Paths in Densely Embedded Graphs
We consider the following maximum disjoint paths problem (mdpp). We are given a large network, and pairs of nodes that wish to communicate over paths through the network — the g...
Jon M. Kleinberg, Éva Tardos
SIGMOD
1995
ACM
116views Database» more  SIGMOD 1995»
14 years 20 days ago
Incremental Maintenance of Views with Duplicates
We study the problem of e cient maintenance of materialized views that may contain duplicates. This problem is particularly important when queries against such views involve aggre...
Timothy Griffin, Leonid Libkin