Sciweavers

280 search results - page 38 / 56
» Constraint Systems for Pattern Analysis of Constraint Logic-...
Sort
View
KES
2005
Springer
15 years 5 months ago
Design of a Digital Forensics Image Mining System
Increasing amount of illicit image data transmitted via the internet has triggered the need to develop effective image mining systems for digital forensics purposes. This paper dis...
Ross Brown, Binh Pham, Olivier Y. de Vel
WICOMM
2010
91views more  WICOMM 2010»
14 years 10 months ago
A sensing-based cognitive coexistence method for interfering infrastructure and ad hoc systems
The rapid proliferation of wireless systems makes interference management more and more important. This paper presents a novel cognitive coexistence framework, which enables an in...
Stefan Geirhofer, Lang Tong, Brian M. Sadler
AOSD
2010
ACM
15 years 6 months ago
Disambiguating aspect-oriented security policies
Many software security policies can be encoded as aspects that identify and guard security-relevant program operations. Bugs in these aspectually-implemented security policies oft...
Micah Jones, Kevin W. Hamlen
INEX
2004
Springer
15 years 5 months ago
Mixture Models, Overlap, and Structural Hints in XML Element Retrieval
We describe the INEX 2004 participation of the Informatics Institute of the University of Amsterdam. We completely revamped our XML retrieval system, now implemented as a mixture l...
Börkur Sigurbjörnsson, Jaap Kamps, Maart...
CCS
2006
ACM
15 years 3 months ago
EXE: automatically generating inputs of death
This paper presents EXE, an effective bug-finding tool that automatically generates inputs that crash real code. Instead of running code on manually or randomly constructed input,...
Cristian Cadar, Vijay Ganesh, Peter M. Pawlowski, ...