Sciweavers

1804 search results - page 280 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
SCAM
2006
IEEE
14 years 2 months ago
SMART C: A Semantic Macro Replacement Translator for C
Programmers often want to transform the source or binary representations of their programs (e.g., to optimize, add dynamic safety checks, or add profile gathering code). Unfortun...
Matthew Jacobs, E. Christopher Lewis
BMCBI
2005
87views more  BMCBI 2005»
13 years 8 months ago
ProfNet, a method to derive profile-profile alignment scoring functions that improves the alignments of distantly related protei
Background: Profile-profile methods have been used for some years now to detect and align homologous proteins. The best such methods use information from the background distributi...
Tomas Ohlson, Arne Elofsson
ICSE
2005
IEEE-ACM
14 years 9 months ago
Monitoring and control in scenario-based requirements analysis
Scenarios are an effective means for eliciting, validating and documenting requirements. At the requirements level, scenarios describe sequences of interactions between the softwa...
Emmanuel Letier, Jeff Kramer, Jeff Magee, Sebasti&...
IROS
2007
IEEE
171views Robotics» more  IROS 2007»
14 years 3 months ago
Learning full-body motions from monocular vision: dynamic imitation in a humanoid robot
— In an effort to ease the burden of programming motor commands for humanoid robots, a computer vision technique is developed for converting a monocular video sequence of human p...
Jeffrey B. Cole, David B. Grimes, Rajesh P. N. Rao
IH
2005
Springer
14 years 2 months ago
Embedding Covert Channels into TCP/IP
It is commonly believed that steganography within TCP/IP is easily achieved by embedding data in header fields seemingly filled with “random” data, such as the IP identifier...
Steven J. Murdoch, Stephen Lewis