Sciweavers

2068 search results - page 145 / 414
» On Effectiveness of Application-Layer Coding
Sort
View
FGIT
2009
Springer
15 years 11 months ago
Automatic Detection for JavaScript Obfuscation Attacks in Web Pages through String Pattern Analysis
Recently, most of malicious web pages include obfuscated codes in order to circumvent the detection of signature-based detection systems .It is difficult to decide whether the sti...
YoungHan Choi, TaeGhyoon Kim, SeokJin Choi, CheolW...
CSMR
2007
IEEE
15 years 11 months ago
Example-Driven Reconstruction of Software Models
As software systems evolve, they become more complex and harder to understand and maintain. Certain reverse engineering techniques attempt to reconstruct software models from sour...
Oscar Nierstrasz, Markus Kobel, Tudor Gîrba,...
ECRTS
2007
IEEE
15 years 11 months ago
Composition Techniques for Tree Communication Schedules
A critical resource in a distributed real-time system is its shared communication medium. Unrestrained concurrent access to the network can lead to collisions that reduce the syst...
Madhukar Anand, Sebastian Fischmeister, Insup Lee
ISCAS
2006
IEEE
96views Hardware» more  ISCAS 2006»
15 years 10 months ago
In-scale motion aligned temporal filtering
— To handle the mismatch problems of spatial-domain motion aligned temporal filtering (MATF) in providing spatial scalability, this paper presents a novel in-scale motion aligne...
Ruiqin Xiong, Jizheng Xu, Feng Wu, Shipeng Li
DATE
2005
IEEE
155views Hardware» more  DATE 2005»
15 years 10 months ago
Studying Storage-Recomputation Tradeoffs in Memory-Constrained Embedded Processing
Fueled by an unprecedented desire for convenience and self-service, consumers are embracing embedded technology solutions that enhance their mobile lifestyles. Consequently, we wi...
Mahmut T. Kandemir, Feihui Li, Guilin Chen, Guangy...