Sciweavers

8177 search results - page 475 / 1636
» Detecting System Emulators
Sort
View
TITS
2002
103views more  TITS 2002»
15 years 4 months ago
Artificial vision in extreme environments for snowcat tracks detection
This paper describes the image processing techniques designed to localize the tracks of snowcats for the automation of transportation of goods and people during the Italian scienti...
Alberto Broggi, Alessandra Fascioli
167
Voted
SEKE
2010
Springer
15 years 3 months ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li
147
Voted
ISDA
2010
IEEE
15 years 2 months ago
Detecting anomalies in spatiotemporal data using genetic algorithms with fuzzy community membership
A genetic algorithm is combined with two variants of the modularity (Q) network analysis metric to examine a substantial amount fisheries catch data. The data set produces one of t...
Garnett Carl Wilson, Simon Harding, Orland Hoeber,...
148
Voted
ICDAR
2009
IEEE
15 years 2 months ago
Symbol Detection Using Region Adjacency Graphs and Integer Linear Programming
In this paper, we tackle the problem of localizing graphical symbols on complex technical document images by using an original approach to solve the subgraph isomorphism problem. ...
Pierre Le Bodic, Hervé Locteau, Séba...
CN
2008
84views more  CN 2008»
15 years 4 months ago
A router-based technique to mitigate reduction of quality (RoQ) attacks
We propose a router-based technique to mitigate the stealthy reduction of quality (RoQ) attacks at the routers in the Internet. The RoQ attacks have been shown to impair the QoS s...
Amey Shevtekar, Nirwan Ansari