Sciweavers

647 search results - page 82 / 130
» Regular Symmetry Patterns
Sort
View
70
Voted
KBSE
2009
IEEE
15 years 5 months ago
Generating Vulnerability Signatures for String Manipulating Programs Using Automata-Based Forward and Backward Symbolic Analyses
Given a program and an attack pattern (specified as a regular expression), we automatically generate string-based vulnerability signatures, i.e., a characterization that includes...
Fang Yu, Muath Alkhalaf, Tevfik Bultan
78
Voted
ISVC
2009
Springer
15 years 5 months ago
Dynamic Chunking for Out-of-Core Volume Visualization Applications
Abstract. Given the size of today’s data, out-of-core visualization techniques are increasingly important in many domains of scientific research. In earlier work a technique cal...
Dan R. Lipsa, R. Daniel Bergeron, Ted M. Sparr, Ro...
96
Voted
ICANN
2007
Springer
15 years 5 months ago
Neuronal Multistability Induced by Delay
Abstract. Feedback circuits are important for understanding the emergence of patterns of neural activity. In this contribution we study how a delayed circuit representing a recurre...
Cristina Masoller, M. C. Torrent, Jordi Garc&iacut...
61
Voted
ASPDAC
2006
ACM
158views Hardware» more  ASPDAC 2006»
15 years 4 months ago
Analysis of scratch-pad and data-cache performance using statistical methods
— An effectively designed and efficiently used memory hierarchy, composed of scratch-pads or cache, is seen today as the key to obtaining energy and performance gains in data-do...
Javed Absar, Francky Catthoor
93
Voted
CIKM
2005
Springer
15 years 4 months ago
ViPER: augmenting automatic information extraction with visual perceptions
In this paper we address the problem of unsupervised Web data extraction. We show that unsupervised Web data extraction becomes feasible when supposing pages that are made up of r...
Kai Simon, Georg Lausen