Sciweavers

1929 search results - page 364 / 386
» Change Propagation Analysis Using Domain Information
Sort
View
MMSEC
2006
ACM
231views Multimedia» more  MMSEC 2006»
15 years 9 months ago
JPEG2000-based secure image authentication
We present an efficient JPEG2000-based image authentication scheme, which is robust to JPEG compression and other allowed signal processing operations. Positive wavelet-based wate...
Mathias Schlauweg, Dima Pröfrock, Erika M&uum...
SIGIR
2008
ACM
15 years 3 months ago
Spoken content retrieval: Searching spontaneous conversational speech
The second workshop on Searching Spontaneous Conversational Speech (SSCS 2008) was held in Singapore on July 24, 2008 in conjunction with the 31st Annual International ACM SIGIR C...
Joachim Köhler, Martha Larson, Franciska de J...
SIGSOFT
2003
ACM
16 years 4 months ago
Protecting C programs from attacks via invalid pointer dereferences
Writes via unchecked pointer dereferences rank high among vulnerabilities most often exploited by malicious code. The most common attacks use an unchecked string copy to cause a b...
Suan Hsi Yong, Susan Horwitz
159
Voted
PAM
2010
Springer
15 years 10 months ago
Network DVR: A Programmable Framework for Application-Aware Trace Collection
Network traces are essential for a wide range of network applications, including traffic analysis, network measurement, performance monitoring, and security analysis. Existing cap...
Chia-Wei Chang, Alexandre Gerber, Bill Lin, Subhab...
CSB
2005
IEEE
167views Bioinformatics» more  CSB 2005»
15 years 9 months ago
SinicView: An Interactive Visualization Tool for Comparison of Multiple Sequence Alignment Results
In the initial stage of sequence analysis, a biologist is first faced with the questions about how to choose the best tool to align sequences of interest and how to analyze and v...
Arthur Chun-Chieh Shih, D. T. Lee, Laurent Lin, Ch...