Sciweavers

1336 search results - page 4 / 268
» SMTP Path Analysis
Sort
View
ICDAR
2011
IEEE
12 years 7 months ago
Symbol Spotting in Line Drawings through Graph Paths Hashing
—In this paper we propose a symbol spotting technique through hashing the shape descriptors of graph paths (Hamiltonian paths). Complex graphical structures in line drawings can ...
Anjan Dutta, Josep Lladós, Umapada Pal
SIGMETRICS
2009
ACM
122views Hardware» more  SIGMETRICS 2009»
14 years 2 months ago
Botnet spam campaigns can be long lasting: evidence, implications, and analysis
Accurately identifying spam campaigns launched by a large number of bots in a botnet allows for accurate spam campaign signature generation and hence is critical to defeating spam...
Abhinav Pathak, Feng Qian, Y. Charlie Hu, Zhuoqing...
SIAMNUM
2010
120views more  SIAMNUM 2010»
13 years 2 months ago
Analysis of an Asymptotic Preserving Scheme for Linear Kinetic Equations in the Diffusion Limit
We present a mathematical analysis of the asymptotic preserving scheme proposed in [M. Lemou and L. Mieussens, SIAM J. Sci. Comput., 31, pp. 334
Jian-Guo Liu, Luc Mieussens
VLSID
2002
IEEE
116views VLSI» more  VLSID 2002»
14 years 8 months ago
Register Transfer Operation Analysis during Data Path Verification
A control part ? data path partition based sequential circuit verification scheme aimed at avoiding state explosion comprises two major modules namely, a data path verifier and a ...
D. Sarkar
ASPLOS
2011
ACM
12 years 11 months ago
S2E: a platform for in-vivo multi-path analysis of software systems
This paper presents S2E, a platform for analyzing the properties and behavior of software systems. We demonstrate S2E’s use in developing practical tools for comprehensive perfo...
Vitaly Chipounov, Volodymyr Kuznetsov, George Cand...