Sciweavers

100 search results - page 11 / 20
» Making revision reversible: an approach based on polynomials
Sort
View
CCS
2010
ACM
14 years 9 months ago
Input generation via decomposition and re-stitching: finding bugs in Malware
Attackers often take advantage of vulnerabilities in benign software, and the authors of benign software must search their code for bugs in hopes of finding vulnerabilities before...
Juan Caballero, Pongsin Poosankam, Stephen McCaman...
EMO
2009
Springer
155views Optimization» more  EMO 2009»
15 years 4 months ago
A Hybrid Integrated Multi-Objective Optimization Procedure for Estimating Nadir Point
A nadir point is constructed by the worst objective values of the solutions of the entire Pareto-optimal set. Along with the ideal point, the nadir point provides the range of obje...
Kalyanmoy Deb, Kaisa Miettinen, Deepak Sharma
IRI
2007
IEEE
15 years 3 months ago
Declarative Web 2.0
Web 2.0 applications have become popular as drivers of new types of Web content, but they have also introduced a new level of interface design in Web development; they are focusin...
Erik Wilde
133
Voted
DASC
2006
IEEE
15 years 3 months ago
On Recognizing Virtual Honeypots and Countermeasures
— Honeypots are decoys designed to trap, delay, and gather information about attackers. We can use honeypot logs to analyze attackers’ behaviors and design new defenses. A virt...
Xinwen Fu, Wei Yu, Dan Cheng, Xuejun Tan, Kevin St...
ICIP
2003
IEEE
15 years 11 months ago
A framework for estimation of orientation and velocity
The paper makes a short presentation of three existing methods for estimation of orientation tensors, the so-called structure tensor, quadrature filter based techniques, and techn...
Gunnar Farnebäck, Klas Nordberg