Sciweavers

280 search results - page 5 / 56
» Vulnerability Discovery Modeling Using Weibull Distribution
Sort
View
ICSE
2005
IEEE-ACM
14 years 7 months ago
Automatic discovery of API-level exploits
We argue that finding vulnerabilities in software components is different from finding exploits against them. Exploits that compromise security often use several low-level details...
Vinod Ganapathy, Sanjit A. Seshia, Somesh Jha, Tho...
ICPR
2010
IEEE
13 years 9 months ago
Noise-Robust Voice Activity Detector Based on Hidden Semi-Markov Models
This paper concentrates on speech duration distributions that are usually invariant to noises and proposes a noise-robust and real-time voice activity detector (VAD) using the hid...
Xianglong Liu, Yuan Liang, Yihua Lou, He Li, Baoso...
IPPS
1998
IEEE
13 years 12 months ago
Measuring the Vulnerability of Interconnection Networks in Embedded Systems
Studies of the fault-tolerance of graphs have tended to largely concentrate on classical graph connectivity. This measure is very basic, and conveys very little information for des...
Vijay Lakamraju, Zahava Koren, Israel Koren, C. Ma...
WCE
2007
13 years 8 months ago
A Model for the Statistical Distribution of Road Vehicle Vibrations
— This paper presents the initial results of a study aimed at improving the method by which the vibrations produced by transport vehicles are characterised and simulated. More sp...
Manuel-Alfredo Garcia-Romeu-Martinez, Vincent Roui...
CN
2006
107views more  CN 2006»
13 years 7 months ago
BGP session lifetime modeling in congested networks
The reliable Border Gateway Protocol (BGP) is essential for supporting high quality Internet data communication. In present Internet, due to the lack of differentiation mechanism ...
Li Xiao, Guanghui He, Klara Nahrstedt