Sciweavers

33 search results - page 7 / 7
» Improving Constraint-Based Testing with Dynamic Linear Relax...
Sort
View
CCS
2007
ACM
13 years 9 months ago
Analyzing network traffic to detect self-decrypting exploit code
Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are...
Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Pu...
PAMI
2006
358views more  PAMI 2006»
13 years 4 months ago
Recovering 3D Human Pose from Monocular Images
We describe a learning based method for recovering 3D human body pose from single images and monocular image sequences. Our approach requires neither an explicit body model nor pri...
Ankur Agarwal, Bill Triggs
ASE
2005
137views more  ASE 2005»
13 years 4 months ago
Rewriting-Based Techniques for Runtime Verification
Techniques for efficiently evaluating future time Linear Temporal Logic (abbreviated LTL) formulae on finite execution traces are presented. While the standard models of LTL are i...
Grigore Rosu, Klaus Havelund