Sciweavers

326 search results - page 47 / 66
» Testing malware detectors
Sort
View

Publication
256views
12 years 10 months ago
Facial Feature Detection Using Distance Vector Fields
A novel method for eye and mouth detection and eye center and mouth corner lo- calization, based on geometrical information is presented in this paper. First, a face detector is ...
Stylianos Asteriadis, Nikos Nikolaidis, Ioannis Pi...
CVPR
2012
IEEE
11 years 11 months ago
On SIFTs and their scales
Scale invariant feature detectors often find stable scales in only a few image pixels. Consequently, methods for feature matching typically choose one of two extreme options: mat...
Tal Hassner, Viki Mayzels, Lihi Zelnik-Manor
ASPLOS
2010
ACM
14 years 3 months ago
ConMem: detecting severe concurrency bugs through an effect-oriented approach
Multicore technology is making concurrent programs increasingly pervasive. Unfortunately, it is difficult to deliver reliable concurrent programs, because of the huge and non-det...
Wei Zhang, Chong Sun, Shan Lu
SIGMOD
2010
ACM
260views Database» more  SIGMOD 2010»
14 years 1 months ago
Towards proximity pattern mining in large graphs
Mining graph patterns in large networks is critical to a variety of applications such as malware detection and biological module discovery. However, frequent subgraphs are often i...
Arijit Khan, Xifeng Yan, Kun-Lung Wu
CCS
2007
ACM
14 years 29 days ago
Analyzing network traffic to detect self-decrypting exploit code
Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are...
Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Pu...