Sciweavers

868 search results - page 83 / 174
» On Analog Signature Analysis
Sort
View
CCS
2005
ACM
15 years 3 months ago
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits
Vulnerabilities that allow worms to hijack the control flow of each host that they spread to are typically discovered months before the worm outbreak, but are also typically disc...
Jedidiah R. Crandall, Zhendong Su, Shyhtsun Felix ...
SDM
2009
SIAM
130views Data Mining» more  SDM 2009»
15 years 7 months ago
FuncICA for Time Series Pattern Discovery.
We introduce FuncICA, a new independent component analysis method for pattern discovery in inherently functional data, such as time series data. FuncICA can be considered an analo...
Alexander Gray, Nishant Mehta
AAIM
2006
Springer
94views Algorithms» more  AAIM 2006»
15 years 3 months ago
Some Basics on Tolerances
In this note we deal with sensitivity analysis of combinatorial optimization problems and its fundamental term, the tolerance. For three classes of objective functions (Σ, Π, MA...
Boris Goldengorin, Gerold Jäger, Paul Molitor
SAS
2005
Springer
162views Formal Methods» more  SAS 2005»
15 years 3 months ago
Boolean Heaps
We show that the idea of predicates on heap objects can be cast in the framework of predicate abstraction. This leads to an alternative view on the underlying concepts of three-val...
Andreas Podelski, Thomas Wies
DAS
2006
Springer
15 years 1 months ago
Groove Extraction of Phonographic Records
Historical sound documents are of high importance for our cultural heritage. The sound of phonographic records is usually extracted by a stylus following the groove, but many old r...
Sylvain Stotzer, Ottar Johnsen, Frédé...