Sciweavers

3070 search results - page 541 / 614
» Making pattern mining useful
Sort
View
SEKE
2010
Springer
13 years 8 months ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li
TVCG
2010
153views more  TVCG 2010»
13 years 8 months ago
A Visual Analytics Approach to Understanding Spatiotemporal Hotspots
As data sources become larger and more complex, the ability to effectively explore and analyze patterns amongst varying sources becomes a critical bottleneck in analytic reasoning...
Ross Maciejewski, Stephen Rudolph, Ryan Hafen, Ahm...
VIROLOGY
2010
162views more  VIROLOGY 2010»
13 years 8 months ago
Applied parallel coordinates for logs and network traffic attack analysis
By looking on how computer security issues are handled today, dealing with numerous and unknown events is not easy. Events need to be normalized, abnormal behaviors must be describ...
Sébastien Tricaud, Philippe Saadé
VL
2010
IEEE
209views Visual Languages» more  VL 2010»
13 years 8 months ago
Towards the Automatic Recognition of Computational Thinking for Adaptive Visual Language Learning
Visual programming languages can be used to make computer science more accessible to a broad range of students. The evaluative focus of current research in the area of visual lang...
Kyu Han Koh, Ashok R. Basawapatna, Vicki Bennett, ...
VTC
2010
IEEE
102views Communications» more  VTC 2010»
13 years 8 months ago
Trace-Based Evaluation of Rate Adaptation Schemes in Vehicular Environments
Abstract—There has been a variety of rate adaptation solutions proposed for both indoor and mobile scenarios. However, dynamic channel changing conditions (e.g., temporal channel...
Kevin C. Lee, Juan M. Navarro, Tin Y. Chong, Uichi...