Sciweavers

5435 search results - page 1040 / 1087
» Informed Detection Revisited
Sort
View
SAC
2006
ACM
15 years 10 months ago
Noxes: a client-side solution for mitigating cross-site scripting attacks
Web applications are becoming the dominant way to provide access to on-line services. At the same time, web application vulnerabilities are being discovered and disclosed at an al...
Engin Kirda, Christopher Krügel, Giovanni Vig...
IWIA
2005
IEEE
15 years 9 months ago
Malware Defense Using Network Security Authentication
Malware defenses have primarily relied upon intrusion fingerprints to detect suspicious network behavior. While effective for discovering computers that are already compromised,...
Joseph V. Antrosio, Errin W. Fulp
IWPC
2005
IEEE
15 years 9 months ago
System Evolution Tracking through Execution Trace Analysis
Software evolution analysis is concerned with analysis of artifacts produced during a software systems life-cycle. Execution traces produced from instrumented code reflect a syst...
Michael Fischer, Johann Oberleitner, Harald Gall, ...
QEST
2005
IEEE
15 years 9 months ago
Workload Propagation - Overload in Bursty Servers
Internet servers are developing into complex but central components in the information infrastructure and are accessed by an ever-increasing and diversified user population. As s...
Qi Zhang, Alma Riska, Erik Riedel
MM
2005
ACM
110views Multimedia» more  MM 2005»
15 years 9 months ago
Multimodal content-based structure analysis of karaoke music
This paper presents a novel approach for content-based analysis of karaoke music, which utilizes multimodal contents including synchronized lyrics text from the video channel and ...
Yongwei Zhu, Kai Chen, Qibin Sun
« Prev « First page 1040 / 1087 Last » Next »