Sciweavers

1056 search results - page 146 / 212
» Identifying and Exploiting Ultrametricity
Sort
View
WOA
2007
13 years 11 months ago
Agents and Security in a Cultural Assets Transport Scenario
Abstract— Museums and exhibitions represent a relevant contribution to the economy all over the world. In Italy, in the year 2006 the 400 national museums, monuments and archaeol...
Stefania Costantini, Arianna Tocchio, Panagiota Ts...
DIMVA
2009
13 years 11 months ago
Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks
Drive-by download attacks are among the most common methods for spreading malware today. These attacks typically exploit memory corruption vulnerabilities in web browsers and brows...
Manuel Egele, Peter Wurzinger, Christopher Kruegel...
GECCO
2008
Springer
155views Optimization» more  GECCO 2008»
13 years 11 months ago
Towards memoryless model building
Probabilistic model building methods can render difficult problems feasible by identifying and exploiting dependencies. They build a probabilistic model from the statistical prope...
David Iclanzan, Dumitru Dumitrescu
BIB
2008
88views more  BIB 2008»
13 years 10 months ago
An overview of image-processing methods for Affymetrix GeneChips
We present an overview of image-processing methods for Affymetrix GeneChips. All GeneChips are affected to some extent by spatially coherent defects and image processing has a num...
Jose M. Arteaga-Salas, Harry Zuzan, William B. Lan...
CEE
2008
119views more  CEE 2008»
13 years 10 months ago
A clustering-based prefetching scheme on a Web cache environment
Web prefetching is an attractive solution to reduce the network resources consumed by Web services as well as the access latencies perceived by Web users. Unlike Web caching, whic...
George Pallis, Athena Vakali, Jaroslav Pokorn&yacu...