Sciweavers

199 search results - page 36 / 40
» Static approximation of dynamically generated Web pages
Sort
View
SOSP
2007
ACM
14 years 4 months ago
Bouncer: securing software by blocking bad input
Attackers exploit software vulnerabilities to control or crash programs. Bouncer uses existing software instrumentation techniques to detect attacks and it generates filters auto...
Manuel Costa, Miguel Castro, Lidong Zhou, Lintao Z...
AVSS
2008
IEEE
14 years 1 months ago
Camera Handoff with Adaptive Resource Management for Multi-camera Multi-target Surveillance
Camera handoff is a crucial step to generate a continuously tracked and consistently labeled trajectory of the object of interest in multi-camera surveillance systems. Most existi...
Chung-Hao Chen, Yi Yao, David L. Page, Besma Roui-...
CORR
2007
Springer
162views Education» more  CORR 2007»
13 years 7 months ago
Exploiting Social Annotation for Automatic Resource Discovery
Information integration applications, such as mediators or mashups, that require access to information resources currently rely on users manually discovering and integrating them ...
Anon Plangprasopchok, Kristina Lerman
ICCBR
2010
Springer
13 years 5 months ago
Taxonomic Semantic Indexing for Textual Case-Based Reasoning
Abstract. Case-Based Reasoning (CBR) solves problems by reusing past problemsolving experiences maintained in a casebase. The key CBR knowledge container therefore is its casebase....
Juan A. Recio-García, Nirmalie Wiratunga
DSN
2007
IEEE
14 years 1 months ago
Robustness and Security Hardening of COTS Software Libraries
COTS components, like software libraries, can be used to reduce the development effort. Unfortunately, many COTS components have been developed without a focus on robustness and s...
Martin Süßkraut, Christof Fetzer