Sciweavers

1525 search results - page 66 / 305
» Matching with Regular Constraints
Sort
View
SP
2006
IEEE
132views Security Privacy» more  SP 2006»
15 years 9 months ago
Towards Automatic Generation of Vulnerability-Based Signatures
In this paper we explore the problem of creating vulnerability signatures. A vulnerability signature matches all exploits of a given vulnerability, even polymorphic or metamorphic...
David Brumley, James Newsome, Dawn Xiaodong Song, ...
144
Voted
ISAAC
2003
Springer
210views Algorithms» more  ISAAC 2003»
15 years 8 months ago
The Student-Project Allocation Problem
We study the problem of allocating students to projects, where both students and lecturers have preferences over projects, and both projects and lecturers have capacities. In this...
David J. Abraham, Robert W. Irving, David Manlove
134
Voted
ICPR
2002
IEEE
16 years 4 months ago
Quantitative Color Optical Flow
We perform a qualitative and quantitative analysis of various multi-framecolor optical flow methods for synthetic and real panning and zooming image sequences. We show that optica...
John L. Barron, Reinhard Klette
133
Voted
BMCBI
2006
153views more  BMCBI 2006»
15 years 3 months ago
The 3of5 web application for complex and comprehensive pattern matching in protein sequences
Background: The identification of patterns in biological sequences is a key challenge in genome analysis and in proteomics. Frequently such patterns are complex and highly variabl...
Markus Seiler, Alexander Mehrle, Annemarie Poustka...
146
Voted
ANCS
2007
ACM
15 years 7 months ago
Ruler: high-speed packet matching and rewriting on NPUs
Programming specialized network processors (NPU) is inherently difficult. Unlike mainstream processors where architectural features such as out-of-order execution and caches hide ...
Tomas Hruby, Kees van Reeuwijk, Herbert Bos