Sciweavers

2990 search results - page 378 / 598
» Thresholding for Change Detection
Sort
View
SIGSOFT
2008
ACM
16 years 5 months ago
Using assertions to help end-user programmers create dependable web macros
Web macros give web browser users ways to "program" tedious tasks, allowing those tasks to be repeated more quickly and reliably than when performed by hand. Web macros ...
Andhy Koesnandar, Sebastian G. Elbaum, Gregg Rothe...
148
Voted
ICC
2009
IEEE
123views Communications» more  ICC 2009»
15 years 11 months ago
Blind Spectrum Sensing for Cognitive Radio Based on Signal Space Dimension Estimation
Abstract—Based on information theoretic tools, a new spectrum sensing method is proposed in this paper to detect vacant sub-bands in the radio spectrum1 . Specifically, based on...
Bassem Zayen, Aawatif Hayar, Kimmo Kansanen
126
Voted
IWSEC
2009
Springer
15 years 11 months ago
Tamper-Tolerant Software: Modeling and Implementation
Abstract. Common software-protection systems attempt to detect malicious observation and modification of protected applications. Upon tamper detection, anti-hacking code may produ...
Mariusz H. Jakubowski, Chit Wei Saw, Ramarathnam V...
153
Voted
IEEEPACT
2008
IEEE
15 years 11 months ago
Redundancy elimination revisited
This work proposes and evaluates improvements to previously known algorithms for redundancy elimination. Enhanced Scalar Replacement combines two classic techniques, scalar replac...
Keith D. Cooper, Jason Eckhardt, Ken Kennedy
ACSAC
2007
IEEE
15 years 11 months ago
MetaAware: Identifying Metamorphic Malware
Detection of malicious software (malware) by the use of static signatures is often criticized for being overly simplistic. Available methods of obfuscating code (so-called metamor...
Qinghua Zhang, Douglas S. Reeves