Sciweavers

46 search results - page 9 / 10
» An empirical model to predict security vulnerabilities using...
Sort
View
HVEI
2010
13 years 3 months ago
No-reference image quality assessment based on localized gradient statistics: application to JPEG and JPEG2000
This paper presents a novel system that employs an adaptive neural network for the no-reference assessment of perceived quality of JPEG/JPEG2000 coded images. The adaptive neural ...
Hantao Liu, Judith Redi, Hani Alers, Rodolfo Zunin...
ESAS
2004
Springer
13 years 10 months ago
Public Key Cryptography in Sensor Networks - Revisited
The common perception of public key cryptography is that it is complex, slow and power hungry, and as such not at all suitable for use in ultra-low power environments like wireless...
Gunnar Gaubatz, Jens-Peter Kaps, Berk Sunar
ICSE
2012
IEEE-ACM
11 years 7 months ago
On the naturalness of software
—Natural languages like English are rich, complex, and powerful. The highly creative and graceful use of languages like English and Tamil, by masters like Shakespeare and Avvaiya...
Abram Hindle, Earl T. Barr, Zhendong Su, Mark Gabe...
ACSAC
2008
IEEE
13 years 11 months ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
SIGSOFT
2008
ACM
14 years 6 months ago
Profile-guided program simplification for effective testing and analysis
Many testing and analysis techniques have been developed for inhouse use. Although they are effective at discovering defects before a program is deployed, these techniques are oft...
Lingxiao Jiang, Zhendong Su