Sciweavers

2662 search results - page 420 / 533
» Objects-early tools: a demonstration
Sort
View
ACSAC
2008
IEEE
15 years 4 months ago
Anti-Phishing in Offense and Defense
Many anti-phishing mechanisms currently focus on helping users verify whether a web site is genuine. However, usability studies have demonstrated that prevention-based approaches ...
Chuan Yue, Haining Wang
ACSAC
2008
IEEE
15 years 4 months ago
Automatic Inference and Enforcement of Kernel Data Structure Invariants
Kernel-level rootkits affect system security by modifying key kernel data structures to achieve a variety of malicious goals. While early rootkits modified control data structur...
Arati Baliga, Vinod Ganapathy, Liviu Iftode
CDC
2008
IEEE
151views Control Systems» more  CDC 2008»
15 years 4 months ago
Analysis of hybrid systems resulting from relay-type hysteresis and saturation: A Lyapunov approach
— This paper studies a class of hybrid systems with linear (or linear plus saturated linear) continuous and discrete dynamics, which are determined by a flow map and jump map, a...
Dan Dai, Ricardo G. Sanfelice, Tingshu Hu, Andrew ...
CEC
2008
IEEE
15 years 4 months ago
Auto-tuning fuzzy granulation for evolutionary optimization
—Much of the computational complexity in employing evolutionary algorithms as optimization tool is due to the fitness function evaluation that may either not exist or be computat...
Mohsen Davarynejad, Mohammad R. Akbarzadeh-Totonch...
CISS
2008
IEEE
15 years 4 months ago
Distributed processing in frames for sparse approximation
—Beyond signal processing applications, frames are also powerful tools for modeling the sensing and information processing of many biological and man-made systems that exhibit in...
Christopher J. Rozell