Sciweavers

9316 search results - page 184 / 1864
» Analysis of traceback techniques
Sort
View
VLDB
2003
ACM
156views Database» more  VLDB 2003»
16 years 4 months ago
Watermarking relational data: framework, algorithms and analysis
We enunciate the need for watermarking database relations to deter data piracy, identify the characteristics of relational data that pose unique challenges for watermarking, and de...
Rakesh Agrawal, Peter J. Haas, Jerry Kiernan
QEST
2009
IEEE
15 years 10 months ago
Safety Analysis of an Airbag System Using Probabilistic FMEA and Probabilistic Counterexamples
—Failure mode and effects analysis (FMEA) is a technique to reason about possible system hazards that result from system or system component failures. Traditionally, FMEA does no...
Husain Aljazzar, Manuel Fischer, Lars Grunske, Mat...
FOSAD
2009
Springer
15 years 10 months ago
The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols
We introduce the Open-source Fixed-point Model Checker OFMC for symbolic security protocol analysis, which extends the Onthe-fly Model Checker (the previous OFMC). The native inpu...
Sebastian Mödersheim, Luca Viganò
NDSS
2008
IEEE
15 years 10 months ago
Impeding Malware Analysis Using Conditional Code Obfuscation
Malware programs that incorporate trigger-based behavior initiate malicious activities based on conditions satisfied only by specific inputs. State-of-the-art malware analyzers ...
Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffi...
AUSAI
2007
Springer
15 years 10 months ago
Automated Intelligent Abundance Analysis of Scallop Survey Video Footage
Underwater video is increasingly being pursued as a low impact alternative to traditional techniques (such as trawls and dredges) for determining abundance and size frequency of ta...
Rob Fearn, Raymond Williams, R. Mike Cameron-Jones...