Sciweavers

1465 search results - page 240 / 293
» Making the Correct Mistakes
Sort
View
CCS
2007
ACM
15 years 4 months ago
Memsherlock: an automated debugger for unknown memory corruption vulnerabilities
Software vulnerabilities have been the main contributing factor to the Internet security problems such as fast spreading worms. Among these software vulnerabilities, memory corrup...
Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu
EMSOFT
2007
Springer
15 years 4 months ago
A communication synthesis infrastructure for heterogeneous networked control systems and its application to building automation
In networked control systems the controller of a physicallydistributed plant is implemented as a collection of tightlyinteracting, concurrent processes running on a distributed ex...
Alessandro Pinto, Luca P. Carloni, Alberto L. Sang...
ESWS
2007
Springer
15 years 4 months ago
The NExT System: Towards True Dynamic Adaptations of Semantic Web Service Compositions
Traditional process support systems typically offer a static composition of atomic tasks to more powerful services. In the real world, however, processes change over time: busines...
Abraham Bernstein, Michael Dänzer
GECCO
2007
Springer
159views Optimization» more  GECCO 2007»
15 years 3 months ago
Evolutionary hypernetwork models for aptamer-based cardiovascular disease diagnosis
We present a biology-inspired probabilistic graphical model, called the hypernetwork model, and its application to medical diagnosis of disease. The hypernetwork models are a way ...
JungWoo Ha, Jae-Hong Eom, Sung-Chun Kim, Byoung-Ta...
ICB
2007
Springer
683views Biometrics» more  ICB 2007»
15 years 3 months ago
Face Detection Based on Multi-Block LBP Representation
Effective and real-time face detection has been made possible by using the method of rectangle Haar-like features with AdaBoost learning since Viola and Jones’ work [12]. In this...
Lun Zhang, Rufeng Chu, Shiming Xiang, ShengCai Lia...