Sciweavers

760 search results - page 94 / 152
» Pedestrian Detection: A Benchmark
Sort
View
AINA
2007
IEEE
14 years 1 months ago
On the Contribution of Preamble to Information Hiding in Mimicry Attacks
In this paper, we aim to determine the significance of different stages of an attack, namely the preamble and the exploit, on an achieved anomaly rate. To this end, we analyze fou...
Hilmi Günes Kayacik, A. Nur Zincir-Heywood
ISPA
2007
Springer
14 years 1 months ago
Parallelization Strategies for the Points of Interests Algorithm on the Cell Processor
The Cell processor is a typical example of a heterogeneous multiprocessor-on-chip architecture that uses several levels of parallelism to deliver high performance. Closing the gap ...
Tarik Saidani, Lionel Lacassagne, Samir Bouaziz, T...
ACSAC
2005
IEEE
14 years 1 months ago
Dynamic Taint Propagation for Java
Improperly validated user input is the underlying root cause for a wide variety of attacks on web-based applications. Static approaches for detecting this problem help at the time...
Vivek Haldar, Deepak Chandra, Michael Franz
ACSAC
2005
IEEE
14 years 1 months ago
A User-level Framework for Auditing and Monitoring
Logging and auditing is an important system facility for monitoring correct system operation and for detecting potential security problems. We present an architecture for implemen...
Yongzheng Wu, Roland H. C. Yap
ATS
2005
IEEE
100views Hardware» more  ATS 2005»
14 years 1 months ago
Finite State Machine Synthesis for At-Speed Oscillation Testability
In this paper, we propose an oscillation-based test methodology for sequential testing. This approach provides many advantages over traditional methods. (1) It is at-speed testing...
Katherine Shu-Min Li, Chung-Len Lee, Tagin Jiang, ...