Sciweavers

2005 search results - page 273 / 401
» Tracking with general regression
Sort
View
130
Voted
PLDI
2009
ACM
15 years 7 months ago
Catch me if you can: permissive yet secure error handling
Program errors are a source of information leaks. Tracking these leaks is hard because error propagation breaks out of program structure. Programming languages often feature excep...
Aslan Askarov, Andrei Sabelfeld
97
Voted
FPGA
2009
ACM
285views FPGA» more  FPGA 2009»
15 years 7 months ago
PERG-Rx: a hardware pattern-matching engine supporting limited regular expressions
PERG is a pattern matching engine designed for locating predefined byte string patterns (rules) from the ClamAV virus signature database in a data stream. This paper presents PERG...
Johnny Tsung Lin Ho, Guy G. Lemieux
131
Voted
CCS
2010
ACM
15 years 7 months ago
Secure provenance: the essential of bread and butter of data forensics in cloud computing
Secure provenance that records ownership and process history of data objects is vital to the success of data forensics in cloud computing, yet it is still a challenging issue toda...
Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin (...
103
Voted
AVSS
2007
IEEE
15 years 7 months ago
Detecting shopper groups in video sequences
We present a generalized extensible framework for automated recognition of swarming activities in video sequences. The trajectory of each individual is produced by the visual trac...
Alex Leykin, Mihran Tuceryan
GECCO
2007
Springer
192views Optimization» more  GECCO 2007»
15 years 6 months ago
Analysis of noisy time-series signals with GA involving viral infection with tropism
In this paper we report on a study in which genetic algorithms are applied to the analysis of noisy time-series signals, which is related to the problem of analyzing the motion ch...
Yuji Sato, Yuta Yasuda, Ryuji Goto