Sciweavers

520 search results - page 11 / 104
» Computing recombination networks from binary sequences
Sort
View
WWW
2008
ACM
16 years 4 months ago
Protecting web services from remote exploit code: a static analysis approach
We propose STILL, a signature-free remote exploit binary code injection attack blocker to protect web servers and web applications. STILL is robust to almost all anti-signature, a...
Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu
126
Voted
SENSYS
2003
ACM
15 years 8 months ago
Tracking a moving object with a binary sensor network
In this paper we examine the role of very simple and noisy sensors for the tracking problem. We propose a binary sensor model, where each sensor’s value is converted reliably to...
Javed A. Aslam, Zack J. Butler, Florin Constantin,...
132
Voted
ICPR
2000
IEEE
16 years 4 months ago
Visual Extraction of Motion-Based Information from Image Sequences
We describe a system which is designed to assist in extracting high-level information from sets or sequences of images. We show that the method of principal components analysis fo...
David P. Gibson, Neill W. Campbell, Colin J. Dalto...
125
Voted
PPSN
1998
Springer
15 years 7 months ago
Inver-over Operator for the TSP
Abstract. In this paper we investigate the usefulness of a new operator, inver-over, for an evolutionary algorithm for the TSP. Inver-over is based on simple inversion, however, kn...
Guo Tao, Zbigniew Michalewicz
115
Voted
DCOSS
2008
Springer
15 years 5 months ago
On the Deterministic Tracking of Moving Objects with a Binary Sensor Network
This paper studies the problem of associating deterministically a track revealed by a binary sensor network with the trajectory of a unique moving anonymous object, namely the Mult...
Yann Busnel, Leonardo Querzoni, Roberto Baldoni, M...