Sciweavers

3951 search results - page 714 / 791
» Automatic amortized analysis
Sort
View
NDSS
2008
IEEE
15 years 6 months ago
Limits of Learning-based Signature Generation with Adversaries
Automatic signature generation is necessary because there may often be little time between the discovery of a vulnerability, and exploits developed to target the vulnerability. Mu...
Shobha Venkataraman, Avrim Blum, Dawn Song
CLUSTER
2007
IEEE
15 years 6 months ago
Anomaly localization in large-scale clusters
— A critical problem facing by managing large-scale clusters is to identify the location of problems in a system in case of unusual events. As the scale of high performance compu...
Ziming Zheng, Yawei Li, Zhiling Lan
KBSE
2007
IEEE
15 years 6 months ago
Modeling bug report quality
Software developers spend a significant portion of their resources handling user-submitted bug reports. For software that is widely deployed, the number of bug reports typically ...
Pieter Hooimeijer, Westley Weimer
NDSS
2007
IEEE
15 years 6 months ago
Generic Application-Level Protocol Analyzer and its Language
Application-level protocol analyzers are important components in tools such as intrusion detection systems, firewalls, and network monitors. Currently, protocol analyzers are wri...
Nikita Borisov, David Brumley, Helen J. Wang, John...
CIVR
2007
Springer
166views Image Analysis» more  CIVR 2007»
15 years 5 months ago
Multi-level local descriptor quantization for bag-of-visterms image representation
In the past, quantized local descriptors have been shown to be a good base for the representation of images, that can be applied to a wide range of tasks. However, current approac...
Pedro Quelhas, Jean-Marc Odobez