Sciweavers

1607 search results - page 287 / 322
» The existence of k-radius sequences
Sort
View
NDSS
2008
IEEE
14 years 3 months ago
Limits of Learning-based Signature Generation with Adversaries
Automatic signature generation is necessary because there may often be little time between the discovery of a vulnerability, and exploits developed to target the vulnerability. Mu...
Shobha Venkataraman, Avrim Blum, Dawn Song
VR
2008
IEEE
128views Virtual Reality» more  VR 2008»
14 years 3 months ago
GVT: a platform to create virtual environments for procedural training
The use of Virtual Environments for Training is strongly stimulated by important needs for training on sensitive equipments. Yet, developing such an application is often done with...
Stéphanie Gerbaud, Nicolas Mollet, Franck G...
ICCV
2007
IEEE
14 years 3 months ago
Motion Analysis of Endovascular Stent-Grafts by MDL Based Registration
The endovascular repair of a traumatic rupture of the thoracic aorta - that would otherwise lead to the death of the patient - is performed by delivering a stent-graft into the ve...
Georg Langs, Nikos Paragios, Rene Donner, Pascal D...
EMSOFT
2007
Springer
14 years 3 months ago
Buffer optimization and dispatching scheme for embedded systems with behavioral transparency
Software components are modular and can enable post-deployment update, but their high overhead in runtime and memory is prohibitive for many embedded systems. This paper proposes ...
Jiwon Hahn, Pai H. Chou
ICN
2007
Springer
14 years 3 months ago
CoLoRaDe: A Novel Algorithm for Controlling Long-Range Dependent Network Traffic
Long-range dependence characteristics have been observed in many natural or physical phenomena. In particular, a significant impact on data network performance has been shown in se...
Karim Mohammed Rezaul, Vic Grout