Sciweavers

2441 search results - page 54 / 489
» Engineering a Tool to Detect Automatically Generated Papers
Sort
View
88
Voted
ACSAC
2008
IEEE
15 years 5 months ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
114
Voted
GIS
2009
ACM
15 years 2 months ago
Next generation map making: geo-referenced ground-level LIDAR point clouds for automatic retro-reflective road feature extractio
This paper presents a novel method to process large scale, ground level Light Detection and Ranging (LIDAR) data to automatically detect geo-referenced navigation attributes (traf...
Xin Chen, Brad Kohlmeyer, Matei Stroila, Narayanan...
101
Voted
ICDAR
2007
IEEE
15 years 20 days ago
Automatic Ground-truth Generation for Document Image Analysis and Understanding
Performance evaluation for document image analysis and understanding is a recurring problem. Many groundtruthed document image databases are now used to evaluate general algorithm...
Pierre Héroux, Eugen Barbu, Sébastie...
88
Voted
ECTEL
2007
Springer
15 years 5 months ago
FAsTA: A Folksonomy-Based Automatic Metadata Generator
Folksonomies provide a free source of keywords describing web resources, however, these keywords are free form and unstructured. In this paper, we describe a novel tool that conver...
Hend S. Al-Khalifa, Hugh C. Davis
SEKE
2010
Springer
14 years 9 months ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li