Sciweavers

3895 search results - page 726 / 779
» Parametric Feature Detection
Sort
View
CCS
2008
ACM
15 years 2 months ago
A practical mimicry attack against powerful system-call monitors
System-call monitoring has become the basis for many hostbased intrusion detection as well as policy enforcement techniques. Mimicry attacks attempt to evade system-call monitorin...
Chetan Parampalli, R. Sekar, Rob Johnson
124
Voted
CASES
2005
ACM
15 years 2 months ago
Segment protection for embedded systems using run-time checks
The lack of virtual memory protection is a serious source of unreliability in many embedded systems. Without the segment-level protection it provides, these systems are subject to...
Matthew Simpson, Bhuvan Middha, Rajeev Barua
131
Voted
DEXA
2006
Springer
197views Database» more  DEXA 2006»
15 years 2 months ago
Cleaning Web Pages for Effective Web Content Mining
Classifying and mining noise-free web pages will improve on accuracy of search results as well as search speed, and may benefit webpage organization applications (e.g., keyword-bas...
Jing Li, Christie I. Ezeife
ACL
2008
15 years 2 months ago
A Critical Reassessment of Evaluation Baselines for Speech Summarization
We assess the current state of the art in speech summarization, by comparing a typical summarizer on two different domains: lecture data and the SWITCHBOARD corpus. Our results ca...
Gerald Penn, Xiaodan Zhu
99
Voted
RIAO
2004
15 years 2 months ago
Improving Ontology-Based User Profiles
Personalized Web browsing and search hope to provide Web information that matches a user's personal interests and thus provide more effective and efficient information access...
Joana Trajkova, Susan Gauch