Sciweavers

754 search results - page 147 / 151
» Generation of Signatures by Deformations
Sort
View
ISSTA
2004
ACM
15 years 3 months ago
Testing malware detectors
In today’s interconnected world, malware, such as worms and viruses, can cause havoc. A malware detector (commonly known as virus scanner) attempts to identify malware. In spite...
Mihai Christodorescu, Somesh Jha
CIKM
2009
Springer
15 years 2 months ago
Space-economical partial gram indices for exact substring matching
Exact substring matching queries on large data collections can be answered using q-gram indices, that store for each occurring q-byte pattern an (ordered) posting list with the po...
Nan Tang, Lefteris Sidirourgos, Peter A. Boncz
EUROCRYPT
1999
Springer
15 years 1 months ago
On the Performance of Hyperelliptic Cryptosystems
In this paper we discuss various aspects of cryptosystems based on hyperelliptic curves. In particular we cover the implementation of the group law on such curves and how to genera...
Nigel P. Smart
MICCAI
1999
Springer
15 years 1 months ago
Analysis of Functional MRI Data Using Mutual Information
Abstract. A new information-theoretic approach is presented for analyzing fMRI data to calculate the brain activation map. The method is based on a formulation of the mutualinforma...
Andy Tsai, John W. Fisher III, Cindy Wible, Willia...
82
Voted
EUROSYS
2010
ACM
15 years 1 months ago
Fingerprinting the Datacenter: Automated Classification of Performance Crises
When a performance crisis occurs in a datacenter, rapid recovery requires quickly recognizing whether a similar incident occurred before, in which case a known remedy may apply, o...
Peter Bodik, Moises Goldszmidt, Armando Fox, Dawn ...