Sciweavers

647 search results - page 82 / 130
» Regular Symmetry Patterns
Sort
View
KBSE
2009
IEEE
14 years 3 months ago
Generating Vulnerability Signatures for String Manipulating Programs Using Automata-Based Forward and Backward Symbolic Analyses
Given a program and an attack pattern (specified as a regular expression), we automatically generate string-based vulnerability signatures, i.e., a characterization that includes...
Fang Yu, Muath Alkhalaf, Tevfik Bultan
ISVC
2009
Springer
14 years 3 months ago
Dynamic Chunking for Out-of-Core Volume Visualization Applications
Abstract. Given the size of today’s data, out-of-core visualization techniques are increasingly important in many domains of scientific research. In earlier work a technique cal...
Dan R. Lipsa, R. Daniel Bergeron, Ted M. Sparr, Ro...
ICANN
2007
Springer
14 years 3 months ago
Neuronal Multistability Induced by Delay
Abstract. Feedback circuits are important for understanding the emergence of patterns of neural activity. In this contribution we study how a delayed circuit representing a recurre...
Cristina Masoller, M. C. Torrent, Jordi Garc&iacut...
ASPDAC
2006
ACM
158views Hardware» more  ASPDAC 2006»
14 years 2 months ago
Analysis of scratch-pad and data-cache performance using statistical methods
— An effectively designed and efficiently used memory hierarchy, composed of scratch-pads or cache, is seen today as the key to obtaining energy and performance gains in data-do...
Javed Absar, Francky Catthoor
CIKM
2005
Springer
14 years 2 months ago
ViPER: augmenting automatic information extraction with visual perceptions
In this paper we address the problem of unsupervised Web data extraction. We show that unsupervised Web data extraction becomes feasible when supposing pages that are made up of r...
Kai Simon, Georg Lausen