Sciweavers

1584 search results - page 45 / 317
» Making priors a priority
Sort
View
USS
2004
15 years 1 months ago
On Gray-Box Program Tracking for Anomaly Detection
Many host-based anomaly detection systems monitor a process ostensibly running a known program by observing the system calls the process makes. Numerous improvements to the precis...
Debin Gao, Michael K. Reiter, Dawn Xiaodong Song
ICSE
2011
IEEE-ACM
14 years 3 months ago
Pragmatic prioritization of software quality assurance efforts
A plethora of recent work leverages historical data to help practitioners better prioritize their software quality assurance efforts. However, the adoption of this prior work in p...
Emad Shihab
GCB
2008
Springer
140views Biometrics» more  GCB 2008»
15 years 27 days ago
FRANz: Fast Reconstruction of Wild Pedigrees
: We present a software package for fast pedigree reconstruction in natural populations using co-dominant genomic markers such as microsatellites and SNPs. If available, the algori...
Markus Riester, Peter F. Stadler, Konstantin Klemm
TIFS
2010
120views more  TIFS 2010»
14 years 6 months ago
Gibbs Construction in Steganography
Abstract--We make a connection between steganography design by minimizing embedding distortion and statistical physics. The unique aspect of this work and one that distinguishes it...
Tomás Filler, Jessica J. Fridrich
NDSS
1999
IEEE
15 years 4 months ago
An Algebra for Assessing Trust in Certification Chains
Open networks allow users to communicate without any prior arrangements such as contractual agreement or organisation membership. However, the very nature of open networks makes a...
Audun Jøsang