Sciweavers

1488 search results - page 257 / 298
» Measuring Semantic Coverage
Sort
View
CCS
2007
ACM
15 years 5 months ago
On the infeasibility of modeling polymorphic shellcode
Current trends demonstrate an increasing use of polymorphism by attackers to disguise their exploits. The ability for malicious code to be easily, and automatically, transformed in...
Yingbo Song, Michael E. Locasto, Angelos Stavrou, ...
SAMT
2007
Springer
135views Multimedia» more  SAMT 2007»
15 years 5 months ago
Stopping Region-Based Image Segmentation at Meaningful Partitions
This paper proposes a new stopping criterion for automatic image segmentation based on region merging. The criterion is dependent on image content itself and when combined with the...
Tomasz Adamek, Noel E. O'Connor
TCC
2007
Springer
124views Cryptology» more  TCC 2007»
15 years 5 months ago
Tackling Adaptive Corruptions in Multicast Encryption Protocols
We prove a computational soundness theorem for symmetric-key encryption protocols that can be used to analyze security against adaptively corrupting adversaries (that is, adversar...
Saurabh Panjwani
GLOBECOM
2006
IEEE
15 years 5 months ago
TCP Performance Improvement through Inter-layer Enhancement with Mobile IPv6
— To enable higher layer transparent, Mobile IPv6 (MIPv6) hides mobility from the transport layer such as TCP, but it has serious implications on TCP due to mobility issues inclu...
Deguang Le, Donghui Guo, Boxi Wu
SIGIR
2006
ACM
15 years 5 months ago
The role of knowledge in conceptual retrieval: a study in the domain of clinical medicine
Despite its intuitive appeal, the hypothesis that retrieval at the level of “concepts” should outperform purely term-based approaches remains unverified empirically. In addit...
Jimmy J. Lin, Dina Demner-Fushman