Sciweavers

161 search results - page 11 / 33
» Performance Evaluation of Fingerprint Verification Systems
Sort
View
ICAC
2006
IEEE
14 years 1 months ago
Fast and Effective Worm Fingerprinting via Machine Learning
— As Internet worms become ever faster and more sophisticated, it is important to be able to extract worm signatures in an accurate and timely manner. In this paper, we apply mac...
Stewart M. Yang, Jianping Song, Harish Rajamani, T...
ISSTA
2006
ACM
14 years 1 months ago
Performance assertions for mobile devices
Assertions have long been used to validate the functionality of software systems. Researchers and practitioners have extended them for validation of non-functional requirements, s...
Raimondas Lencevicius, Edu Metz
ICMCS
1999
IEEE
118views Multimedia» more  ICMCS 1999»
13 years 11 months ago
Evaluation of Copyright Marking Systems
Hidden copyright marks have been proposed as a solution for solving the illegal copying and proof of ownership problems in the context of multimedia objects. Many systems have been...
Fabien A. P. Petitcolas, Ross J. Anderson
CASES
2011
ACM
12 years 7 months ago
Enabling parametric feasibility analysis in real-time calculus driven performance evaluation
This paper advocates a rigorously formal and compositional style for obtaining key performance and/or interface metrics of systems with real-time constraints. We propose a hierarc...
Alena Simalatsar, Yusi Ramadian, Kai Lampka, Simon...
CCR
2011
13 years 2 months ago
Misbehaviors in TCP SACK generation
While analyzing CAIDA Internet traces of TCP traffic to detect instances of data reneging, we frequently observed seven misbehaviors in the generation of SACKs. These misbehaviors...
Nasif Ekiz, Abuthahir Habeeb Rahman, Paul D. Amer