Sciweavers

2330 search results - page 165 / 466
» A System for Object Class Detection
Sort
View
DBSEC
2006
115views Database» more  DBSEC 2006»
15 years 6 months ago
Creating Objects in the Flexible Authorization Framework
Access control is a crucial concern to build secure IT systems and, more specifically, to protect the confidentiality of information. However, access control is necessary, but not ...
Nicola Zannone, Sushil Jajodia, Duminda Wijesekera
WORM
2003
15 years 5 months ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...
COMPSAC
2008
IEEE
15 years 4 months ago
Superfit Combinational Elusive Bug Detection
Software that has been well tested and analyzed may fail unpredictably when a certain combination of conditions occurs. In Bounded Exhaustive Testing (BET) all combinations are te...
R. Barzin, S. Fukushima, William E. Howden, S. Sha...
SIGMOD
2003
ACM
147views Database» more  SIGMOD 2003»
16 years 4 months ago
Formal semantics and analysis of object queries
Modern database systems provide not only powerful data models but also complex query languages supporting powerful features such as the ability to create new database objects and ...
Gavin M. Bierman
146
Voted
MVA
2007
162views Computer Vision» more  MVA 2007»
15 years 4 months ago
Location-Based Tracking of Moving Obstacles from a Mobile Robot
Tracking moving obstacles from a moving platform is a useful skill for the coming generation of mobile robot. The methods used in existing moving objects tracking that operated fr...
Thatsaphan Suwannathat, Jun-ichi Imai, Masahide Ka...