Sciweavers

113 search results - page 21 / 23
» Combinatorics of Periods in Strings
Sort
View
CCS
2005
ACM
13 years 11 months ago
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits
Vulnerabilities that allow worms to hijack the control flow of each host that they spread to are typically discovered months before the worm outbreak, but are also typically disc...
Jedidiah R. Crandall, Zhendong Su, Shyhtsun Felix ...
CORR
2011
Springer
188views Education» more  CORR 2011»
13 years 1 months ago
Primitive words and roots of words
In the algebraic theory of codes and formal languages, the set Q of all primitive words over some alphabet Σ has received special interest. With this survey article we give an ove...
Gerhard Lischke
ICDAR
1999
IEEE
13 years 10 months ago
A Two-state Markov Chain Model of Degraded Document Images
We propose a two-state Markov chain model of degraded document images. The model generates random and burst noise to simulate isolated pixel reversal as well as blurring of a larg...
Shamik Sural, P. K. Das
AINA
2009
IEEE
13 years 10 months ago
Impact of Power Control in Wireless Sensor Networks Powered by Ambient Energy Harvesting (WSN-HEAP) for Railroad Health Monitori
The use of wireless sensor networks (WSNs) for structural health monitoring is gaining popularity since it allows for a low-cost, rapid and robust assessment of structural integri...
Hwee Pink Tan, Pius W. Q. Lee, Winston Khoon Guan ...
BCSHCI
2007
13 years 7 months ago
Bluetooth friendly names: bringing classic HCI questions into the mobile space
We explore the use of Bluetooth friendly names within the mobile space. Each Bluetooth-enabled device possesses a short string known as a ‘friendly name’ used to help identify...
Barry Lavelle, Daragh Byrne, Gareth J. F. Jones, A...