Sciweavers

326 search results - page 47 / 66
» Testing malware detectors
Sort
View

Publication
256views
14 years 3 months ago
Facial Feature Detection Using Distance Vector Fields
A novel method for eye and mouth detection and eye center and mouth corner lo- calization, based on geometrical information is presented in this paper. First, a face detector is ...
Stylianos Asteriadis, Nikos Nikolaidis, Ioannis Pi...
CVPR
2012
IEEE
13 years 4 months ago
On SIFTs and their scales
Scale invariant feature detectors often find stable scales in only a few image pixels. Consequently, methods for feature matching typically choose one of two extreme options: mat...
Tal Hassner, Viki Mayzels, Lihi Zelnik-Manor
ASPLOS
2010
ACM
15 years 8 months ago
ConMem: detecting severe concurrency bugs through an effect-oriented approach
Multicore technology is making concurrent programs increasingly pervasive. Unfortunately, it is difficult to deliver reliable concurrent programs, because of the huge and non-det...
Wei Zhang, Chong Sun, Shan Lu
SIGMOD
2010
ACM
260views Database» more  SIGMOD 2010»
15 years 6 months ago
Towards proximity pattern mining in large graphs
Mining graph patterns in large networks is critical to a variety of applications such as malware detection and biological module discovery. However, frequent subgraphs are often i...
Arijit Khan, Xifeng Yan, Kun-Lung Wu
CCS
2007
ACM
15 years 5 months ago
Analyzing network traffic to detect self-decrypting exploit code
Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are...
Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Pu...