Abstract. Ontology matching has become an important field of research over the last years. Although many different approaches have been proposed, only few of them are committed t...
In this paper we explore the problem of creating vulnerability signatures. A vulnerability signature matches all exploits of a given vulnerability, even polymorphic or metamorphic...
David Brumley, James Newsome, Dawn Xiaodong Song, ...
CT-angiography is a well established medical imaging technique for the detection, evaluation and therapy planning of intracranial aneurysms. Different 3D visualization algorithms s...
Sabine Iserhardt-Bauer, Peter Hastreiter, Bernd To...
The high availability of video streams is making necessary mechanisms for indexing such contents in the Web world. In this paper we focus on news programs and we propose a mechani...
Identifying suitable image features is a central challenge in computer vision, ranging from representations for lowlevel to high-level vision. Due to the difficulty of this task,...