Sciweavers

945 search results - page 65 / 189
» Detective Information Flow Analysis for Business Processes
Sort
View
RAID
2005
Springer
15 years 7 months ago
Polymorphic Worm Detection Using Structural Information of Executables
Abstract. Network worms are malicious programs that spread automatically across networks by exploiting vulnerabilities that affect a large number of hosts. Because of the speed at...
Christopher Krügel, Engin Kirda, Darren Mutz,...
ICIP
2002
IEEE
15 years 6 months ago
Detection and segmentation of sweeps in color graphics images
Business graphics are an important class of digital imagery. Such images are computer-generated, and comprise synthetic elements such as solid fills, line art, and color sweeps. O...
Salil Prabhakar, Hui Cheng, Raja Bala, John C. Han...
ICDAR
2009
IEEE
15 years 8 months ago
Information Extraction from Multimodal ECG Documents
With the rise of tools for clinical decision support, there is an increased need for automatic processing of electrocardiograms (ECG) documents. In fact, many systems have already...
Fei Wang, Tanveer Fathima Syeda-Mahmood, David Bey...
HICSS
2007
IEEE
269views Biometrics» more  HICSS 2007»
15 years 8 months ago
Wireless Forensic Analysis Tools for Use in the Electronic Evidence Collection Process
This paper discusses the need for both a series of electronic tools and procedural changes to the evidence collection process to accommodate the possibilities of wireless technolo...
Benjamin Turnbull, Jill Slay
101
Voted
AIMS
2007
Springer
15 years 8 months ago
Harnessing Models for Policy Conflict Analysis
Policy conflict analysis processes based solely on the examination of policy language constructs can not readily discern the semantics associated with the managed system for which ...
Steven Davy, Brendan Jennings