Sciweavers

712 search results - page 57 / 143
» New Techniques for Generation and Analysis of Evolutionary T...
Sort
View
SP
2006
IEEE
132views Security Privacy» more  SP 2006»
14 years 3 months ago
Towards Automatic Generation of Vulnerability-Based Signatures
In this paper we explore the problem of creating vulnerability signatures. A vulnerability signature matches all exploits of a given vulnerability, even polymorphic or metamorphic...
David Brumley, James Newsome, Dawn Xiaodong Song, ...
COMCOM
2008
80views more  COMCOM 2008»
13 years 9 months ago
Robust video-on-demand streaming in peer-to-peer environments
This paper presents a new video-on-demand streaming technique in peer-to-peer (P2P) environments. While a number of P2P live video streaming techniques have been proposed in the p...
Tai T. Do, Kien A. Hua, Mounir A. Tantaoui
ICDM
2009
IEEE
112views Data Mining» more  ICDM 2009»
14 years 3 months ago
Spatio-temporal Multi-dimensional Relational Framework Trees
—The real world is composed of sets of objects that move and morph in both space and time. Useful concepts can be defined in terms of the complex interactions between the multi-...
Matthew Bodenhamer, Samuel Bleckley, Daniel Fennel...
IROS
2009
IEEE
111views Robotics» more  IROS 2009»
14 years 3 months ago
An exploration method for general robotic systems equipped with multiple sensors
Abstract— This paper presents a novel method for sensorbased exploration of unknown environments by a general robotic system equipped with multiple sensors. The method is based o...
Luigi Freda, Giuseppe Oriolo, Francesco Vecchioli
PAKDD
2009
ACM
126views Data Mining» more  PAKDD 2009»
14 years 3 months ago
Tree-Based Method for Classifying Websites Using Extended Hidden Markov Models
One important problem proposed recently in the field of web mining is website classification problem. The complexity together with the necessity to have accurate and fast algorit...
Majid Yazdani, Milad Eftekhar, Hassan Abolhassani