Sciweavers

1489 search results - page 165 / 298
» The First Bug Report
Sort
View
CCS
2009
ACM
15 years 11 months ago
Your botnet is my botnet: analysis of a botnet takeover
Botnets, networks of malware-infected machines that are controlled by an adversary, are the root cause of a large number of security problems on the Internet. A particularly sophi...
Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, ...
EVOW
2009
Springer
15 years 11 months ago
Diversity Control and Multi-Parent Recombination for Evolutionary Graph Coloring Algorithms
We present a hybrid evolutionary algorithm for the graph coloring problem (Evocol). Evocol is based on two simple-but-effective ideas. First, we use an enhanced crossover that col...
Daniel Cosmin Porumbel, Jin-Kao Hao, Pascale Kuntz
TACAS
2009
Springer
136views Algorithms» more  TACAS 2009»
15 years 11 months ago
Path Feasibility Analysis for String-Manipulating Programs
We discuss the problem of path feasibility for programs manipulating strings using a collection of standard string library functions. We prove results on the complexity of this pro...
Nikolaj Bjørner, Nikolai Tillmann, Andrei V...
113
Voted
HAPTICS
2009
IEEE
15 years 11 months ago
Determining appropriate parameters to elicit linear and circular apparent motion using vibrotactile cues
This paper reports on two experiments we conducted to look at how to design effective linear and circular apparent-motion displays. Using a two-tactor array on the upper arm, the ...
Masataka Niwa, Robert W. Lindeman, Yuichi Itoh, Fu...
161
Voted
SEMCO
2009
IEEE
15 years 11 months ago
Semantic Image Classification for Medical Videos
Due to rapid advances in video technology and biomedicine, there has been a tremendous growth in the volume of medical video data for recent years. Exploring the full potential of...
Shih-Hsi Liu, Yu Cao, Yili Li, Ming Li, Sanqing Hu