Sciweavers

2236 search results - page 127 / 448
» Intrusion detection techniques and approaches
Sort
View
ICSE
2012
IEEE-ACM
13 years 15 days ago
Industrial application of concolic testing approach: A case study on libexif by using CREST-BV and KLEE
—As smartphones become popular, manufacturers such as Samsung Electronics are developing smartphones with rich functionality such as a camera and photo editing quickly, which acc...
Yunho Kim, Moonzoo Kim, Young Joo Kim, Yoonkyu Jan...
ICDAR
2009
IEEE
15 years 4 months ago
A Modified Adaptive Logical Level Binarization Technique for Historical Document Images
In this paper, a new document image binarization technique is presented, as an improved version of the state-of-the-art adaptive logical level technique (ALLT). The original ALLT ...
Konstantinos Ntirogiannis, Basilios Gatos, Ioannis...
ICPP
2008
IEEE
15 years 4 months ago
Scalable Techniques for Transparent Privatization in Software Transactional Memory
—We address the recently recognized privatization problem in software transactional memory (STM) runtimes, and introduce the notion of partially visible reads (PVRs) to heuristic...
Virendra J. Marathe, Michael F. Spear, Michael L. ...
EUROMICRO
2004
IEEE
15 years 1 months ago
An Experimental Framework for Testing Web Prefetching Techniques
The popularity of web objects, and by extension the popularity of the web sites, besides the appearance of clear footprints in user's accesses that show a considerable spatia...
Josep Domènech, Ana Pont, Julio Sahuquillo,...
VR
2011
IEEE
286views Virtual Reality» more  VR 2011»
14 years 1 months ago
Shadow walking: An unencumbered locomotion technique for systems with under-floor projection
When viewed from below, a user’s feet cast shadows onto the floor screen of an under-floor projection system, such as a sixsided CAVE. Tracking those shadows with a camera provi...
David J. Zielinski, Ryan P. McMahan, Rachel B. Bra...