Sciweavers

4211 search results - page 836 / 843
» Types as Abstract Interpretations
Sort
View
TDSC
2010
191views more  TDSC 2010»
13 years 5 months ago
SigFree: A Signature-Free Buffer Overflow Attack Blocker
—We propose SigFree, an online signature-free out-of-the-box application-layer method for blocking code-injection buffer overflow attack messages targeting at various Internet se...
Xinran Wang, Chi-Chun Pan, Peng Liu, Sencun Zhu
TIP
2010
117views more  TIP 2010»
13 years 5 months ago
Multistatic Synthetic Aperture Radar Image Formation
Abstract—In this paper, we consider a multistatic synthetic aperture radar (SAR) imaging scenario where a swarm of airborne antennas, some of which are transmitting, receiving or...
V. Krishnan, J. Swoboda, Can Evren Yarman, Birsen ...
TKDE
2010
284views more  TKDE 2010»
13 years 5 months ago
Unsupervised Semantic Similarity Computation between Terms Using Web Documents
Abstract— In this work, web-based metrics for semantic similarity computation between words or terms are presented and compared with the state-of-the-art. Starting from the funda...
Elias Iosif, Alexandros Potamianos
CORR
2010
Springer
157views Education» more  CORR 2010»
13 years 5 months ago
Stochastic Budget Optimization in Internet Advertising
Internet advertising is a sophisticated game in which the many advertisers "play" to optimize their return on investment. There are many "targets" for the adve...
Bhaskar DasGupta, S. Muthukrishnan
ASIACRYPT
2010
Springer
13 years 5 months ago
Improved Single-Key Attacks on 8-Round AES-192 and AES-256
Abstract. AES is the most widely used block cipher today, and its security is one of the most important issues in cryptanalysis. After 13 years of analysis, related-key attacks wer...
Orr Dunkelman, Nathan Keller, Adi Shamir