Sciweavers

557 search results - page 65 / 112
» Two experiences designing for effective security
Sort
View
CCS
2007
ACM
14 years 2 months ago
Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction
An alarming trend in malware attacks is that they are armed with stealthy techniques to detect, evade, and subvert malware detection facilities of the victim. On the defensive sid...
Xuxian Jiang, Xinyuan Wang, Dongyan Xu
MMSEC
2006
ACM
195views Multimedia» more  MMSEC 2006»
14 years 2 months ago
Image annotation watermarking: nested object embedding using hypergraph model
In this paper, we introduce to the special domain of image annotation watermarking, based on embedding of hierarchical data related to objects into user-selected areas on an image...
Claus Vielhauer, Maik Schott
ECBS
2007
IEEE
119views Hardware» more  ECBS 2007»
14 years 3 months ago
IPOG: A General Strategy for T-Way Software Testing
Most existing work on t-way testing has focused on 2-way (or pairwise) testing, which aims to detect faults caused by interactions between any two parameters. However, faults can ...
Yu Lei, Raghu Kacker, D. Richard Kuhn, Vadim Okun,...
ECRTS
2005
IEEE
14 years 2 months ago
Scheduling Tasks with Markov-Chain Based Constraints
Markov-Chain (MC) based constraints have been shown to be an effective QoS measure for a class of real-time systems, particularly those arising from control applications. Scheduli...
Donglin Liu, Xiaobo Sharon Hu, Michael D. Lemmon, ...
AAAI
2007
13 years 11 months ago
PhotoSlap: A Multi-player Online Game for Semantic Annotation
Multimedia content presents special challenges for the search engines, and could benefit from semantic annotation of images. Unfortunately, manual labeling is too tedious and tim...
Chien-Ju Ho, Tsung-Hsiang Chang, Jane Yung-jen Hsu