Sciweavers

712 search results - page 124 / 143
» New Techniques for Generation and Analysis of Evolutionary T...
Sort
View
CCS
2009
ACM
14 years 2 months ago
Robust signatures for kernel data structures
Kernel-mode rootkits hide objects such as processes and threads using a technique known as Direct Kernel Object Manipulation (DKOM). Many forensic analysis tools attempt to detect...
Brendan Dolan-Gavitt, Abhinav Srivastava, Patrick ...
WWW
2009
ACM
14 years 8 months ago
Automated construction of web accessibility models from transaction click-streams
Screen readers, the dominant assistive technology used by visually impaired people to access the Web, function by speaking out the content of the screen serially. Using screen rea...
Jalal Mahmud, Yevgen Borodin, I. V. Ramakrishnan, ...
RTSS
2005
IEEE
14 years 1 months ago
Event Count Automata: A State-Based Model for Stream Processing Systems
Recently there has been a growing interest in models and methods targeted towards the (co)design of stream processing applications; e.g. those for audio/video processing. Streams ...
Samarjit Chakraborty, Linh T. X. Phan, P. S. Thiag...
TIFS
2008
148views more  TIFS 2008»
13 years 7 months ago
Digital Image Forensics via Intrinsic Fingerprints
Digital imaging has experienced tremendous growth in recent decades, and digital camera images have been used in a growing number of applications. With such increasing popularity a...
Ashwin Swaminathan, Min Wu, K. J. Ray Liu
ICRA
1998
IEEE
148views Robotics» more  ICRA 1998»
13 years 12 months ago
Position Estimation Using Principal Components of Range Data
1 sensors is to construct a structural description from sensor data and to match this description to a previously acquired model [Crowley 85]. An alternative is to project individu...
James L. Crowley, Frank Wallner, Bernt Schiele