Sciweavers

1056 search results - page 52 / 212
» Identifying and Exploiting Ultrametricity
Sort
View
IISWC
2008
IEEE
14 years 2 months ago
Temporal streams in commercial server applications
Commercial server applications remain memory bound on modern multiprocessor systems because of their large data footprints, frequent sharing, complex non-strided access patterns, ...
Thomas F. Wenisch, Michael Ferdman, Anastasia Aila...
IPPS
2007
IEEE
14 years 2 months ago
Security Threat Prediction in a Local Area Network Using Statistical Model
In today’s large and complex network scenario vulnerability scanners play a major role from security perspective by proactively identifying the known security problems or vulner...
Somak Bhattacharya, S. K. Ghosh
ICMCS
2010
IEEE
150views Multimedia» more  ICMCS 2010»
13 years 8 months ago
H.264 stream replacement watermarking with CABAC encoding
This paper describes a watermarking method to directly embed information into a CABAC entropy coded H.264/AVC stream. In theory, modification of a part of an arithmetically coded ...
Dekun Zou, Jeffrey A. Bloom
DLOG
2010
13 years 5 months ago
Generating Referring Expressions with OWL2
The task of generating referring expressions, an important subtask of Natural Language Generation is to generate phrases that uniquely identify domain entities. Until recently, man...
Yuan Ren, Kees van Deemter, Jeff Z. Pan
SP
2006
IEEE
132views Security Privacy» more  SP 2006»
14 years 1 months ago
Towards Automatic Generation of Vulnerability-Based Signatures
In this paper we explore the problem of creating vulnerability signatures. A vulnerability signature matches all exploits of a given vulnerability, even polymorphic or metamorphic...
David Brumley, James Newsome, Dawn Xiaodong Song, ...