Sciweavers

766 search results - page 106 / 154
» How to Read a Signature
Sort
View
FGIT
2009
Springer
14 years 3 months ago
Automatic Detection for JavaScript Obfuscation Attacks in Web Pages through String Pattern Analysis
Recently, most of malicious web pages include obfuscated codes in order to circumvent the detection of signature-based detection systems .It is difficult to decide whether the sti...
YoungHan Choi, TaeGhyoon Kim, SeokJin Choi, CheolW...
ICCS
2009
Springer
14 years 3 months ago
Access Policy Design Supported by FCA Methods
Role Based Access Control (RBAC) is a methodology for providing users in an IT system specific permissions like write or read to t abstracts from specific users and binds permiss...
Frithjof Dau, Martin Knechtel
MKM
2009
Springer
14 years 3 months ago
A Logically Saturated Extension of
This paper presents a proof language based on the work of Sacerdoti Coen [1,2], Kirchner [3] and Autexier [4] on ¯λµ˜µ, a calculus introduced by Curien and Herbelin [5,6]. Jus...
Lionel Elie Mamane, Herman Geuvers, James McKinna
ICASSP
2008
IEEE
14 years 3 months ago
Extracting clues from human interpreter speech for spoken language translation
In previous work, we reported dramatic improvements in automatic speech recognition (ASR) and spoken language translation (SLT) gained by applying information extracted from spoke...
Matthias Paulik, Alex Waibel
ICNSC
2008
IEEE
14 years 3 months ago
A Theoretic Framework for Object Class Tracking
— suppose we have a video, the first half of this video is capturing the images of a sedan and the second half is recording the moving of a truck, can we use the same video track...
Yu Cao, Steve Read, Sachin Raka, Revanth Nandamuri