Sciweavers

16070 search results - page 193 / 3214
» Identifying
Sort
View
162
Voted
PKC
2009
Springer
142views Cryptology» more  PKC 2009»
16 years 5 months ago
Identification of Multiple Invalid Signatures in Pairing-Based Batched Signatures
This paper describes new methods in pairing-based signature schemes for identifying the invalid digital signatures in a batch, after batch verification has failed. These methods ef...
Brian J. Matt
136
Voted
CHI
2005
ACM
16 years 5 months ago
Tool for accurately predicting website navigation problems, non-problems, problem severity, and effectiveness of repairs
The Cognitive Walkthrough for the Web (CWW) is a partially automated usability evaluation method for identifying and repairing website navigation problems. Building on five earlie...
Marilyn Hughes Blackmon, Muneo Kitajima, Peter G. ...
WCRE
2009
IEEE
15 years 11 months ago
Automatic Static Unpacking of Malware Binaries
—Current malware is often transmitted in packed or encrypted form to prevent examination by anti-virus software. To analyze new malware, researchers typically resort to dynamic c...
Kevin Coogan, Saumya K. Debray, Tasneem Kaochar, G...
IEEEPACT
2009
IEEE
15 years 11 months ago
Chainsaw: Using Binary Matching for Relative Instruction Mix Comparison
With advances in hardware, instruction set architectures are undergoing continual evolution. As a result, compilers are under constant pressure to adapt and take full advantage of...
Tipp Moseley, Dirk Grunwald, Ramesh Peri
141
Voted
SSD
2009
Springer
170views Database» more  SSD 2009»
15 years 11 months ago
Discovering Teleconnected Flow Anomalies: A Relationship Analysis of Dynamic Neighborhoods (RAD) Approach
Given a collection of sensors monitoring a flow network, the problem of discovering teleconnected flow anomalies aims to identify strongly connected
James M. Kang, Shashi Shekhar, Michael Henjum, Pai...