Sciweavers

1629 search results - page 250 / 326
» Infeasible Code Detection
Sort
View
COMPSAC
2002
IEEE
14 years 3 months ago
XVIP: An XML-Based Video Information Processing System
We describe XVIP, an XML-based video information processing system, which extracts information from video and stores the information in a multimedia digital video library. XVIP en...
Edith C. H. Ngai, Pat Pik-Wah Chan, Edward Yau, Mi...
IH
1998
Springer
14 years 2 months ago
Fingerprinting Digital Circuits on Programmable Hardware
Advanced CAD tools and high-density VLSI technologies have combined to create a new market for reusable digital designs. The economic viability of the new core-based design paradig...
John Lach, William H. Mangione-Smith, Miodrag Potk...
AIRWEB
2006
Springer
14 years 2 months ago
Tracking Web Spam with Hidden Style Similarity
Automatically generated content is ubiquitous in the web: dynamic sites built using the three-tier paradigm are good examples (e.g. commercial sites, blogs and other sites powered...
Tanguy Urvoy, Thomas Lavergne, Pascal Filoche
GECCO
2006
Springer
124views Optimization» more  GECCO 2006»
14 years 1 months ago
On evolving buffer overflow attacks using genetic programming
In this work, we employed genetic programming to evolve a "white hat" attacker; that is to say, we evolve variants of an attack with the objective of providing better de...
Hilmi Günes Kayacik, Malcolm I. Heywood, A. N...
ATAL
2003
Springer
14 years 1 months ago
A configurable mobile agent data protection protocol
This paper addresses the problem of protecting the data carried by mobile agents from the possible attacks of malicious execution hosts. Specifically, we consider protection mecha...
Paolo Maggi, Riccardo Sisto