Sciweavers

784 search results - page 30 / 157
» Web-Site Boundary Detection
Sort
View
DIMVA
2009
13 years 9 months ago
Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks
Drive-by download attacks are among the most common methods for spreading malware today. These attacks typically exploit memory corruption vulnerabilities in web browsers and brows...
Manuel Egele, Peter Wurzinger, Christopher Kruegel...
LATIN
2010
Springer
14 years 1 months ago
Finding the Minimum-Distance Schedule for a Boundary Searcher with a Flashlight
Consider a dark polygonal region in which intruders move freely, trying to avoid detection. A robot, which is equipped with a flashlight, moves along the polygon boundary to illum...
Tsunehiko Kameda, Ichiro Suzuki, John Z. Zhang
IWCM
2004
Springer
14 years 2 months ago
Boundary Characterization Within the Wedge-Channel Representation
Abstract. Junctions play an important role in motion analysis. Approaches based on the structure tensor have become the standard for junction detection. However, the structure tens...
Ullrich Köthe
USENIX
2008
13 years 11 months ago
Spectator: Detection and Containment of JavaScript Worms
Recent popularity of interactive AJAX-based Web 2.0 applications has given rise to a new breed of security threats: JavaScript worms. In this paper we propose Spectator, the first...
V. Benjamin Livshits, Weidong Cui
ICMCS
2005
IEEE
99views Multimedia» more  ICMCS 2005»
14 years 2 months ago
Finding the Optimal Temporal Partitioning of Video Sequences
The existing techniques for shot partitioning either process each shot boundary independently or proceed sequentially. The sequential process assumes the last shot boundary is cor...
Ba Tu Truong, Svetha Venkatesh