Sciweavers

1804 search results - page 241 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
82
Voted
MVA
2008
196views Computer Vision» more  MVA 2008»
14 years 10 months ago
Evaluation of an appearance-based 3D face tracker using dense 3D data
The ability to detect and track human heads and faces in video sequences can be considered as the finest level of any video surveillance system. In this paper, we introduce a gener...
Fadi Dornaika, Angel Domingo Sappa
88
Voted
DSOM
2003
Springer
15 years 3 months ago
Idiosyncratic Signatures for Authenticated Execution of Management Code
TrustedFlow™ is a software solution to the problem of remotely authenticating code during execution. A continuous flow of idiosyncratic signatures assures that the software from ...
Mario Baldi, Yoram Ofek, Moti Yung
AMM
2011
118views more  AMM 2011»
14 years 5 months ago
From Community Detection to Mentor Selection in Rating-Free Collaborative Filtering
—The number of resources or items that users can now access when navigating on the Web or using e-services, is so huge that these might feel lost due to the presence of too much ...
Armelle Brun, Sylvain Castagnos, Anne Boyer
USS
2010
14 years 8 months ago
Toward Automated Detection of Logic Vulnerabilities in Web Applications
Web applications are the most common way to make services and data available on the Internet. Unfortunately, with the increase in the number and complexity of these applications, ...
Viktoria Felmetsger, Ludovico Cavedon, Christopher...
ISCA
2002
IEEE
102views Hardware» more  ISCA 2002»
15 years 3 months ago
Implementing Optimizations at Decode Time
The number of pipeline stages separating dynamic instruction scheduling from instruction execution has increased considerably in recent out-of-order microprocessor implementations...
Ilhyun Kim, Mikko H. Lipasti