Sciweavers

539 search results - page 80 / 108
» Multiple Pattern Matching Algorithms on Collage System
Sort
View
SEKE
2010
Springer
15 years 8 days ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li
126
Voted
ICB
2007
Springer
280views Biometrics» more  ICB 2007»
15 years 8 months ago
3D Model-Based Face Recognition in Video
Face recognition in video has gained wide attention due to its role in designing surveillance systems. One of the main advantages of video over still frames is that evidence accumu...
Unsang Park, Anil K. Jain
CCS
2010
ACM
15 years 5 months ago
Scene tagging: image-based CAPTCHA using image composition and object relationships
In this paper, we propose a new form of image-based CAPTCHA we term "scene tagging". It tests the ability to recognize a relationship between multiple objects in an imag...
Peter Matthews, Cliff Changchun Zou
PR
2008
145views more  PR 2008»
15 years 1 months ago
Probabilistic suffix models for API sequence analysis of Windows XP applications
Given the pervasive nature of malicious mobile code (viruses, worms, etc.), developing statistical/structural models of code execution is of considerable importance. We investigat...
Geoffrey Mazeroff, Jens Gregor, Michael G. Thomaso...
VLDB
1998
ACM
82views Database» more  VLDB 1998»
15 years 6 months ago
Resource Scheduling for Composite Multimedia Objects
Scheduling algorithms for composite multimedia presentations need to ensure that the user-defined synchronization constraints for the various presentation components are met. This...
Minos N. Garofalakis, Yannis E. Ioannidis, Banu &O...