Sciweavers

2362 search results - page 404 / 473
» A new approach to edge detection
Sort
View
NDSS
2008
IEEE
15 years 6 months ago
Automated Whitebox Fuzz Testing
Fuzz testing is an effective technique for finding security vulnerabilities in software. Traditionally, fuzz testing tools apply random mutations to well-formed inputs of a progr...
Patrice Godefroid, Michael Y. Levin, David A. Moln...
IPSN
2004
Springer
15 years 5 months ago
Backcasting: adaptive sampling for sensor networks
Wireless sensor networks provide an attractive approach to spatially monitoring environments. Wireless technology makes these systems relatively flexible, but also places heavy d...
Rebecca Willett, Aline Martin, Robert Nowak
IUI
2010
ACM
15 years 6 months ago
From documents to tasks: deriving user tasks from document usage patterns
A typical knowledge worker is involved in multiple tasks and switches frequently between them every work day. These frequent switches become expensive because each task switch req...
Oliver Brdiczka
ESORICS
2004
Springer
15 years 5 months ago
Discovering Novel Attack Strategies from INFOSEC Alerts
Abstract. Correlating security alerts and discovering attack strategies are important and challenging tasks for security analysts. Recently, there have been several proposed techni...
Xinzhou Qin, Wenke Lee
BMCBI
2010
156views more  BMCBI 2010»
14 years 12 months ago
Comparative classification of species and the study of pathway evolution based on the alignment of metabolic pathways
Background: Pathways provide topical descriptions of cellular circuitry. Comparing analogous pathways reveals intricate insights into individual functional differences among speci...
Adi Mano, Tamir Tuller, Oded Béjà, R...