Sciweavers

831 search results - page 60 / 167
» Interesting Patterns Extraction Using Prior Knowledge
Sort
View
ACSAC
2010
IEEE
13 years 5 months ago
Cujo: efficient detection and prevention of drive-by-download attacks
The JavaScript language is a core component of active and dynamic web content in the Internet today. Besides its great success in enhancing web applications, however, JavaScript p...
Konrad Rieck, Tammo Krueger, Andreas Dewald
IJCV
2010
131views more  IJCV 2010»
13 years 6 months ago
Using the Particle Filter Approach to Building Partial Correspondences Between Shapes
Abstract Constructing correspondencesbetween points characterizing one shape with those characterizing another is crucial to understanding what the two shapes have in common. These...
Rolf Lakämper, Marc Sobel
APVIS
2010
13 years 9 months ago
A sketch-based interface for classifying and visualizing vector fields
In flow visualization, field lines are often used to convey both global and local structure and movement of the flow. One challenge is to find and classify the representative fiel...
Jishang Wei, Chaoli Wang, Hongfeng Yu, Kwan-Liu Ma
EUROPKI
2009
Springer
13 years 5 months ago
ABUSE: PKI for Real-World Email Trust
Current PKI-based email systems (such as X.509 S/MIME and PGP/ MIME) potentially enable a recipient to determine a name and organizational affiliation of the sender. This informati...
Chris Masone, Sean W. Smith
SIGSOFT
2005
ACM
14 years 1 months ago
PR-Miner: automatically extracting implicit programming rules and detecting violations in large software code
Programs usually follow many implicit programming rules, most of which are too tedious to be documented by programmers. When these rules are violated by programmers who are unawar...
Zhenmin Li, Yuanyuan Zhou