Sciweavers

16 search results - page 3 / 4
» Test input generation for java containers using state matchi...
Sort
View
SP
2006
IEEE
132views Security Privacy» more  SP 2006»
14 years 10 days ago
Towards Automatic Generation of Vulnerability-Based Signatures
In this paper we explore the problem of creating vulnerability signatures. A vulnerability signature matches all exploits of a given vulnerability, even polymorphic or metamorphic...
David Brumley, James Newsome, Dawn Xiaodong Song, ...
JMM2
2006
167views more  JMM2 2006»
13 years 6 months ago
Computer Vision Methods for Improved Mobile Robot State Estimation in Challenging Terrains
External perception based on vision plays a critical role in developing improved and robust localization algorithms, as well as gaining important information about the vehicle and ...
Annalisa Milella, Giulio Reina, Roland Siegwart
BMCBI
2006
156views more  BMCBI 2006»
13 years 6 months ago
Score-based prediction of genomic islands in prokaryotic genomes using hidden Markov models
Background: Horizontal gene transfer (HGT) is considered a strong evolutionary force shaping the content of microbial genomes in a substantial manner. It is the difference in spee...
Stephan Waack, Oliver Keller, Roman Asper, Thomas ...
ICDM
2007
IEEE
476views Data Mining» more  ICDM 2007»
14 years 19 days ago
FiVaTech: Page-Level Web Data Extraction from Template Pages
In this paper, we proposed a new approach, called FiVaTech for the problem of Web data extraction. FiVaTech is a page-level data extraction system which deduces the data schema an...
Mohammed Kayed, Chia-Hui Chang, Khaled F. Shaalan,...
ASE
2004
137views more  ASE 2004»
13 years 6 months ago
Automatically Restructuring Programs for the Web
The construction of interactive server-side Web applications differs substantially from the construction of traditional interactive programs. In contrast, existing Web programming...
Jacob Matthews, Robert Bruce Findler, Paul T. Grau...