Sciweavers

264 search results - page 24 / 53
» Source-Based Trace Exploration
Sort
View
BIRTHDAY
2005
Springer
14 years 3 months ago
Term Rewriting Meets Aspect-Oriented Programming
We explore the connection between term rewriting systems (TRS) and aspect-oriented programming (AOP). Term rewriting is a paradigm that is used in fields such as program transform...
Paul Klint, Tijs van der Storm, Jurgen J. Vinju
IV
2002
IEEE
121views Visualization» more  IV 2002»
14 years 2 months ago
Representing Spatial Information through Multimodal Interfaces
The research discussed here is a component of a larger study to explore the accessibility and usability of spatial data presented through multiple sensory modalities including hap...
R. Dan Jacobson
ICIP
2006
IEEE
14 years 11 months ago
Scalable Multimedia Fingerprinting Forensics with Side Information
Digital fingerprinting uniquely labels each distributed copy with user's ID and provides a proactive means to track the distribution of multimedia. Multi-user collusion is a ...
Wan-Yi Sabrina Lin, H. Vicky Zhao, K. J. Ray Liu
ICIP
2006
IEEE
14 years 11 months ago
Behavior Forensics in Traitors within Traitors for Scalable Multimedia
A cost effective attack against multimedia forensics is the multiuser collusion attack, in which several attackers mount attacks collectively to remove traces of the identifying f...
K. J. Ray Liu, H. Vicky Zhao
RAID
2009
Springer
14 years 4 months ago
Automatically Adapting a Trained Anomaly Detector to Software Patches
Abstract. In order to detect a compromise of a running process based on it deviating from its program’s normal system-call behavior, an anomaly detector must first be trained wi...
Peng Li, Debin Gao, Michael K. Reiter