Sciweavers

106 search results - page 11 / 22
» Using Visualization to Detect Plagiarism in Computer Science...
Sort
View
VIZSEC
2004
Springer
14 years 25 days ago
Passive visual fingerprinting of network attack tools
This paper examines the dramatic visual fingerprints left by a wide variety of popular network attack tools in order to better understand the specific methodologies used by attack...
Gregory J. Conti, Kulsoom Abdullah
SPIN
2009
Springer
14 years 2 months ago
A Decision Procedure for Detecting Atomicity Violations for Communicating Processes with Locks
Abstract. We present a new decision procedure for detecting property violations in pushdown models for concurrent programs that use lock-based synchronization, where each thread’...
Nicholas Kidd, Peter Lammich, Tayssir Touili, Thom...
GI
2009
Springer
13 years 5 months ago
A Static Analysis Technique to Detect Unsatisfiable Conditions in Ontology-based Workflows
: Static analysis techniques for consistency checking of workflows allow to avoid runtime errors. This is in particular crucial for long running workflows where errors, detected la...
Gabriele Weiler, Arnd Poetzsch-Heffter, Stephan Ki...
CVPR
2009
IEEE
13 years 11 months ago
Keypoint induced distance profiles for visual recognition
We show that histograms of keypoint descriptor distances can make useful features for visual recognition. Descriptor distances are often exhaustively computed between sets of keyp...
Tat-Jun Chin, David Suter
DIS
2006
Springer
13 years 11 months ago
Automatic Recognition of Landforms on Mars Using Terrain Segmentation and Classification
Mars probes send back to Earth enormous amount of data. Automating the analysis of this data and its interpretation represents a challenging test of significant benefit to the doma...
Tomasz F. Stepinski, Soumya Ghosh, Ricardo Vilalta