Sciweavers

2236 search results - page 389 / 448
» Intrusion detection techniques and approaches
Sort
View
PEPM
2009
ACM
14 years 6 months ago
Guided model checking for programs with polymorphism
Exhaustive model checking search techniques are ineffective for error discovery in large and complex multi-threaded software systems. Distance estimate heuristics guide the concre...
Neha Rungta, Eric G. Mercer
CVPR
2010
IEEE
14 years 5 months ago
Visual Object Tracking using Adaptive Correlation Filters
Although not commonly used, correlation filters can track complex objects through rotations, occlusions and other distractions at over 20 times the rate of current state-ofthe-ar...
David Bolme, J Ross Beveridge, Bruce Draper, Yui M...
ESORICS
2009
Springer
14 years 3 months ago
Hide and Seek in Time - Robust Covert Timing Channels
Abstract. Covert timing channels aim at transmitting hidden messages by controlling the time between transmissions of consecutive payload packets in overt network communication. Pr...
Yali Liu, Dipak Ghosal, Frederik Armknecht, Ahmad-...
WCRE
2009
IEEE
14 years 3 months ago
The Logical Modularity of Programs
Abstract—The principles and best practices of object oriented design require that modules in a program should match logical decomposition of the knowledge that the program implem...
Daniel Ratiu, Radu Marinescu, Jan Jürjens
IWPC
2009
IEEE
14 years 3 months ago
A plethora of paths
A common static software bug detection technique is to use path simulation. Each execution path is simulated using symbolic variables to determine if any software errors could occ...
Eric Larson