Sciweavers

380 search results - page 29 / 76
» Time Capsule Signature
Sort
View
NDSS
2008
IEEE
14 years 2 months ago
Limits of Learning-based Signature Generation with Adversaries
Automatic signature generation is necessary because there may often be little time between the discovery of a vulnerability, and exploits developed to target the vulnerability. Mu...
Shobha Venkataraman, Avrim Blum, Dawn Song
CIVR
2005
Springer
154views Image Analysis» more  CIVR 2005»
14 years 2 months ago
A Novel Texture Descriptor Using Over-Complete Wavelet Transform and Its Fractal Signature
In the paper, we proposed a novel feature descriptor using over-complete wavelet transform and wavelet domain based fractal signature for texture image analysis and retrieval. Trad...
Qing Wang, David Dagan Feng
ASIACRYPT
1999
Springer
14 years 23 days ago
ECC: Do We Need to Count?
Abstract. A prohibitive barrier faced by elliptic curve users is the difficulty of computing the curves’ cardinalities. Despite recent theoretical breakthroughs, point counting ...
Jean-Sébastien Coron, Helena Handschuh, Dav...
ICIAR
2007
Springer
13 years 10 months ago
A Simple Oriented Mean-Shift Algorithm for Tracking
Mean-Shift tracking gained a lot of popularity in computer vision community. This is due to its simplicity and robustness. However, the original formulation does not estimate the o...
Jamil Draréni, Sébastien Roy
CONEXT
2007
ACM
13 years 10 months ago
Detecting worm variants using machine learning
Network intrusion detection systems typically detect worms by examining packet or flow logs for known signatures. Not only does this approach mean worms cannot be detected until ...
Oliver Sharma, Mark Girolami, Joseph S. Sventek