Sciweavers

1629 search results - page 165 / 326
» Infeasible Code Detection
Sort
View
90
Voted
CHI
2011
ACM
14 years 1 months ago
Feedlack detects missing feedback in web applications
While usability methods such as user studies and inspections can reveal a wide range of problems, they do so for only a subset of an application’s features and states. We presen...
Andrew J. Ko, Xing Zhang
ICC
2007
IEEE
15 years 4 months ago
Combating Media Noise for High-Density Optical Recording
— Media noise is the dominant noise that severely degrades the channel detector’s performance for high-density optical recording. In this paper, we first propose a simple but ...
Kui Cai, Yong Ning Foo, Jan W. M. Bergmans
118
Voted
CASES
2005
ACM
15 years 5 days ago
Anomalous path detection with hardware support
Embedded systems are being deployed as a part of critical infrastructures and are vulnerable to malicious attacks due to internet accessibility. Intrusion detection systems have b...
Tao Zhang, Xiaotong Zhuang, Santosh Pande, Wenke L...
117
Voted
CAV
2011
Springer
216views Hardware» more  CAV 2011»
14 years 1 months ago
Malware Analysis with Tree Automata Inference
Abstract. The underground malware-based economy is flourishing and it is evident that the classical ad-hoc signature detection methods are becoming insufficient. Malware authors ...
Domagoj Babic, Daniel Reynaud, Dawn Song
ICC
2007
IEEE
116views Communications» more  ICC 2007»
15 years 4 months ago
A Simple Iterative Gaussian Detector for Severely Delay-Spread MIMO Channels
— In this paper, a low-complexity high-performance detection algorithm for multiple input multiple output (MIMO) channels with severe delay spread is proposed. This algorithm per...
Tianbin Wo, Peter Adam Hoeher