Sciweavers

853 search results - page 160 / 171
» New test approach for embedded applications
Sort
View
SP
2006
IEEE
132views Security Privacy» more  SP 2006»
15 years 3 months ago
Towards Automatic Generation of Vulnerability-Based Signatures
In this paper we explore the problem of creating vulnerability signatures. A vulnerability signature matches all exploits of a given vulnerability, even polymorphic or metamorphic...
David Brumley, James Newsome, Dawn Xiaodong Song, ...
CVPR
2010
IEEE
15 years 2 months ago
The Automatic Design of Feature Spaces for Local Image Descriptors using an Ensemble of Non-linear Feature Extractors
The design of feature spaces for local image descriptors is an important research subject in computer vision due to its applicability in several problems, such as visual classifi...
Gustavo Carneiro
SIGGRAPH
1998
ACM
15 years 1 months ago
Visibility Sorting and Compositing Without Splitting for Image Layer Decompositions
We present an efficient algorithm for visibility sorting a set of moving geometric objects into a sequence of image layers which are composited to produce the final image. Inste...
John M. Snyder, Jed Lengyel
CTRSA
2009
Springer
141views Cryptology» more  CTRSA 2009»
15 years 1 months ago
Practical Short Signature Batch Verification
In many applications, it is desirable to work with signatures that are both short, and yet where many messages from different signers be verified very quickly. RSA signatures sati...
Anna Lisa Ferrara, Matthew Green, Susan Hohenberge...
AROBOTS
2008
134views more  AROBOTS 2008»
14 years 9 months ago
Mobile manipulators for assisted living in residential settings
Abstract: We describe a methodology for creating new technologies for assisted living in residential environments. The number of eldercare clients is expected to grow dramatically ...
Patrick Deegan, Roderic A. Grupen, Allen R. Hanson...