Sciweavers

2169 search results - page 372 / 434
» Using Risk Analysis to Evaluate Design Alternatives
Sort
View
SP
2010
IEEE
140views Security Privacy» more  SP 2010»
14 years 21 days ago
Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries
Abstract—Unfortunately, malicious software is still an unsolved problem and a major threat on the Internet. An important component in the fight against malicious software is the...
Clemens Kolbitsch, Thorsten Holz, Christopher Krue...
ACSAC
2004
IEEE
14 years 17 days ago
Visualizing and Identifying Intrusion Context from System Calls Trace
Anomaly-based Intrusion Detection (AID) techniques are useful for detecting novel intrusions without known signatures. However, AID techniques suffer from higher false alarm rate ...
Zhuowei Li, Amitabha Das
LREC
2008
89views Education» more  LREC 2008»
13 years 10 months ago
Sign Language Corpus Annotation: toward a new Methodology
This paper deals with non manual gestures annotation involved in Sign Language within the context of automatic generation of Sign Language. We will tackle linguistic researches in...
Emilie Chételat-Pelé, Annelies Braff...
INTERACT
1997
13 years 10 months ago
Methods for Measuring Usability
The tutorial explains the benefits of measuring usability as part of a user-centred design process, and introduces the participants to the methodology for usability measurement dev...
Nigel Bevan, Ian Curson
CONCURRENCY
2007
101views more  CONCURRENCY 2007»
13 years 8 months ago
OpenUH: an optimizing, portable OpenMP compiler
OpenMP has gained wide popularity as an API for parallel programming on shared memory and distributed shared memory platforms. Despite its broad availability, there remains a need ...
Chunhua Liao, Oscar Hernandez, Barbara M. Chapman,...