Sciweavers

4307 search results - page 396 / 862
» Dynamic Spyware Analysis
Sort
View
ICIP
2008
IEEE
16 years 6 months ago
Game-theoretic analysis of maximum-payoff multiuser collusion
Multiuser collusion is an effective attack against traitor-tracing multimedia fingerprinting, where a group of attackers collectively mount attacks to reduce their risk of being d...
H. Vicky Zhao, Wan-Yi Sabrina Lin, K. J. Ray Liu
ICIP
1995
IEEE
16 years 5 months ago
Multiresolution model development for overlapping trees via canonical correlation analysis
Recently a class of multiscale stochastic models has been introducedin which Gaussian random processes are described by scale-recursive dynamics that are indexed by the nodes of a...
Paul W. Fieguth, William W. Irving, Alan S. Willsk...
VIS
2007
IEEE
103views Visualization» more  VIS 2007»
16 years 5 months ago
Generalized Streak Lines: Analysis and Visualization of Boundary Induced Vortices
Abstract--We present a method to extract and visualize vortices that originate from bounding walls of three-dimensional timedependent flows. These vortices can be detected using th...
Alexander Wiebel, Xavier Tricoche, Dominic Schne...
WWW
2003
ACM
16 years 5 months ago
Detecting Near-replicas on the Web by Content and Hyperlink Analysis
The presence of replicas or near-replicas of documents is very common on the Web. Documents may be replicated completely or partially for different reasons (versions, mirrors, etc...
Ernesto Di Iorio, Michelangelo Diligenti, Marco Go...
PODS
2008
ACM
110views Database» more  PODS 2008»
16 years 4 months ago
Static analysis of active XML systems
Active XML is a high-level specification language tailored to dataintensive, distributed, dynamic Web services. Active XML is based on XML documents with embedded function calls. ...
Serge Abiteboul, Luc Segoufin, Victor Vianu