Sciweavers

817 search results - page 84 / 164
» Malware behaviour analysis
Sort
View
COMPSAC
2010
IEEE
14 years 8 months ago
Security in Context: Analysis and Refinement of Software Architectures
Security analysis methods can provide correct yet meaningless results if the assumptions underlying the model do not conform to reality. We present an approach to analyze the secur...
Thomas Heyman, Riccardo Scandariato, Wouter Joosen
IJCV
2010
574views more  IJCV 2010»
14 years 10 months ago
Time-Delayed Correlation Analysis for Multi-Camera Activity Understanding
We propose a novel approach to understanding activities from their partial observations monitored through multiple non-overlapping cameras separated by unknown time gaps. In our...
Chen Change Loy, Tao Xiang, Shaogang Gong
ICCV
2007
IEEE
16 years 1 months ago
On the Differential Geometry of 3D Flow Patterns: Generalized Helicoids and Diffusion MRI Analysis
Configurations of dense locally parallel 3D curves occur in medical imaging, computer vision and graphics. Examples include white matter fibre tracts, textures, fur and hair. We d...
Peter Savadjiev, Steven W. Zucker, Kaleem Siddiqi
79
Voted
ICSE
2005
IEEE-ACM
15 years 12 months ago
Monitoring and control in scenario-based requirements analysis
Scenarios are an effective means for eliciting, validating and documenting requirements. At the requirements level, scenarios describe sequences of interactions between the softwa...
Emmanuel Letier, Jeff Kramer, Jeff Magee, Sebasti&...
CEC
2009
IEEE
15 years 6 months ago
Dispatching rules for production scheduling: A hyper-heuristic landscape analysis
— Hyper-heuristics or “heuristics to chose heuristics” are an emergent search methodology that seeks to automate the process of selecting or combining simpler heuristics in o...
Gabriela Ochoa, José Antonio Vázquez...