Sciweavers

2236 search results - page 327 / 448
» Intrusion detection techniques and approaches
Sort
View
APLAS
2008
ACM
13 years 11 months ago
Context-Sensitive Relevancy Analysis for Efficient Symbolic Execution
Abstract. Symbolic execution is a flexible and powerful, but computationally expensive technique to detect dynamic behaviors of a program. In this paper, we present a context-sensi...
Xin Li, Daryl Shannon, Indradeep Ghosh, Mizuhito O...
BMVC
1997
13 years 10 months ago
Real-time Dynamic Deformable Meshes for Volumetric Segmentation and Visualisation
This paper presents a surface segmentation method which uses a simulated inflating balloon model to segment surface structure from volumetric data using a triangular mesh. The mod...
Richard Bowden, T. A. Mitchell, M. Sahardi
CGF
2008
165views more  CGF 2008»
13 years 9 months ago
Visual Inspection of Multivariate Graphs
Most graph visualization techniques focus on the structure of graphs and do not offer support for dealing with node attributes and edge labels. To enable users to detect relations...
A. Johannes Pretorius, Jarke J. van Wijk
TAICPART
2010
IEEE
133views Education» more  TAICPART 2010»
13 years 7 months ago
Localizing Defects in Multithreaded Programs by Mining Dynamic Call Graphs
Abstract. Writing multithreaded software for multicore computers confronts many developers with the difficulty of finding parallel programming errors. In the past, most parallel d...
Frank Eichinger, Victor Pankratius, Philipp W. L. ...
PAM
2011
Springer
13 years 4 days ago
Omnify: Investigating the Visibility and Effectiveness of Copyright Monitors
1 The arms race between copyright agencies and P2P users is an ongoing and evolving struggle. On the one hand, content providers are using several techniques to stealthily find un...
Rahul Potharaju, Jeff Seibert, Sonia Fahmy, Cristi...