Sciweavers

3481 search results - page 632 / 697
» A New Approach to Component Testing
Sort
View
SP
2006
IEEE
132views Security Privacy» more  SP 2006»
15 years 11 months ago
Towards Automatic Generation of Vulnerability-Based Signatures
In this paper we explore the problem of creating vulnerability signatures. A vulnerability signature matches all exploits of a given vulnerability, even polymorphic or metamorphic...
David Brumley, James Newsome, Dawn Xiaodong Song, ...
SIGGRAPH
1998
ACM
15 years 9 months ago
Visibility Sorting and Compositing Without Splitting for Image Layer Decompositions
We present an efficient algorithm for visibility sorting a set of moving geometric objects into a sequence of image layers which are composited to produce the final image. Inste...
John M. Snyder, Jed Lengyel
CTRSA
2009
Springer
141views Cryptology» more  CTRSA 2009»
15 years 9 months ago
Practical Short Signature Batch Verification
In many applications, it is desirable to work with signatures that are both short, and yet where many messages from different signers be verified very quickly. RSA signatures sati...
Anna Lisa Ferrara, Matthew Green, Susan Hohenberge...
AROBOTS
2008
134views more  AROBOTS 2008»
15 years 5 months ago
Mobile manipulators for assisted living in residential settings
Abstract: We describe a methodology for creating new technologies for assisted living in residential environments. The number of eldercare clients is expected to grow dramatically ...
Patrick Deegan, Roderic A. Grupen, Allen R. Hanson...
148
Voted
BMCBI
2007
165views more  BMCBI 2007»
15 years 5 months ago
TagSmart: analysis and visualization for yeast mutant fitness data measured by tag microarrays
Background: A nearly complete collection of gene-deletion mutants (96% of annotated open reading frames) of the yeast Saccharomyces cerevisiae has been systematically constructed....
Chulyun Kim, Sangkyum Kim, Russell Dorer, Dan Xie,...