Sciweavers

4820 search results - page 215 / 964
» Implementing Signatures for C
Sort
View
143
Voted
USS
2010
15 years 1 months ago
Securing Script-Based Extensibility in Web Browsers
Web browsers are increasingly designed to be extensible to keep up with the Web's rapid pace of change. This extensibility is typically implemented using script-based extensi...
Vladan Djeric, Ashvin Goel
135
Voted
USS
2010
15 years 1 months ago
Automatic Generation of Remediation Procedures for Malware Infections
Despite the widespread deployment of malwaredetection software, in many situations it is difficult to preemptively block a malicious program from infecting a system. Rather, signa...
Roberto Paleari, Lorenzo Martignoni, Emanuele Pass...
144
Voted
JMLR
2010
185views more  JMLR 2010»
14 years 10 months ago
HMMPayl: an application of HMM to the analysis of the HTTP Payload
Zero-days attacks are one of the most dangerous threats against computer networks. These, by definition, are attacks never seen before. Thus, defense tools based on a database of ...
Davide Ariu, Giorgio Giacinto
133
Voted
CVPR
2011
IEEE
14 years 7 months ago
Visual textures as realizations of multivariate log-Gaussian Cox processes
In this paper, we address invariant keypoint-based texture characterization and recognition. Viewing keypoint sets associated with visual textures as realizations of point process...
Huu-Giao Nguyen, Ronan Fablet, Jean-Marc Boucher
PLILP
1998
Springer
15 years 7 months ago
Compiling Erlang to Scheme
The programming languages Erlang and Scheme have many common features, yet the performance of the current implementations of Erlang appears to be below that of good implementations...
Marc Feeley, Martin Larose