Sciweavers

13500 search results - page 2700 / 2700
» Improved analysis of D
Sort
View
SP
2010
IEEE
220views Security Privacy» more  SP 2010»
14 years 1 months ago
TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection
—Fuzz testing has proven successful in finding security vulnerabilities in large programs. However, traditional fuzz testing tools have a well-known common drawback: they are in...
Tielei Wang, Tao Wei, Guofei Gu, Wei Zou
TRECVID
2007
13 years 11 months ago
PicSOM Experiments in TRECVID 2007
Our experiments in TRECVID 2007 include participation in the high-level feature extraction, search, and video summarization tasks, using a common system framework based on multipl...
Markus Koskela, Mats Sjöberg, Ville Viitaniem...
COMCOM
2006
178views more  COMCOM 2006»
13 years 9 months ago
SIP-based MIP6-MANET: Design and implementation of mobile IPv6 and SIP-based mobile ad hoc networks
In this paper, we designed and implemented an integrated wireless system, namely a SIP-based MIP6-MANET system. This SIP-based MIP6MANET system is an integration and implementatio...
Yuh-Shyan Chen, Yun-Hsuan Yang, Ren-Hung Hwang
CORR
1998
Springer
84views Education» more  CORR 1998»
13 years 9 months ago
Comparing a statistical and a rule-based tagger for German
In this paper we present the results of comparing a statistical tagger for German based on decision trees and a rule-based Brill-Tagger for German. We used the same training corpu...
Martin Volk, Gerold Schneider
BMCBI
2011
13 years 4 months ago
Comparing genotyping algorithms for Illumina's Infinium whole-genome SNP BeadChips
Background: Illumina’s Infinium SNP BeadChips are extensively used in both small and large-scale genetic studies. A fundamental step in any analysis is the processing of raw all...
Matthew E. Ritchie, Ruijie Liu, Benilton Carvalho,...
« Prev « First page 2700 / 2700 Last » Next »