Sciweavers

562 search results - page 107 / 113
» Evaluating an InfoVis Technique Using Insight Reports
Sort
View
ICST
2009
IEEE
15 years 6 months ago
Predicting Attack-prone Components
GEGICK, MICHAEL CHARLES. Predicting Attack-prone Components with Source Code Static Analyzers. (Under the direction of Laurie Williams). No single vulnerability detection techniqu...
Michael Gegick, Pete Rotella, Laurie A. Williams
97
Voted
IWCMC
2010
ACM
15 years 4 months ago
Estimating routing symmetry on single links by passive flow measurements
The assumption of routing symmetry is often embedded into traffic analysis and classification tools. This paper uses passively captured network data to estimate the amount of tra...
Wolfgang John, Maurizio Dusi, Kimberly C. Claffy
DCC
2000
IEEE
15 years 4 months ago
RD-Optimization of Hierarchical Structured Adaptive Vector Quantization for Video Coding
This paper contains two contributions to very-low-bitrate video coding. First, we show that in contrast to common practice incremental techniques for rate-distortion optimization ...
Marcel Wagner, Dietmar Saupe
CCS
2008
ACM
15 years 1 months ago
Privacy oracle: a system for finding application leaks with black box differential testing
We describe the design and implementation of Privacy Oracle, a system that reports on application leaks of user information via the network traffic that they send. Privacy Oracle ...
Jaeyeon Jung, Anmol Sheth, Ben Greenstein, David W...
BMCBI
2010
117views more  BMCBI 2010»
14 years 12 months ago
Identification of NAD interacting residues in proteins
Background: Small molecular cofactors or ligands play a crucial role in the proper functioning of cells. Accurate annotation of their target proteins and binding sites is required...
Hifzur Rahman Ansari, Gajendra P. S. Raghava