Sciweavers

4211 search results - page 836 / 843
» Types as Abstract Interpretations
Sort
View
117
Voted
TDSC
2010
191views more  TDSC 2010»
15 years 8 days ago
SigFree: A Signature-Free Buffer Overflow Attack Blocker
—We propose SigFree, an online signature-free out-of-the-box application-layer method for blocking code-injection buffer overflow attack messages targeting at various Internet se...
Xinran Wang, Chi-Chun Pan, Peng Liu, Sencun Zhu
TIP
2010
117views more  TIP 2010»
15 years 8 days ago
Multistatic Synthetic Aperture Radar Image Formation
Abstract—In this paper, we consider a multistatic synthetic aperture radar (SAR) imaging scenario where a swarm of airborne antennas, some of which are transmitting, receiving or...
V. Krishnan, J. Swoboda, Can Evren Yarman, Birsen ...
139
Voted
TKDE
2010
284views more  TKDE 2010»
15 years 8 days ago
Unsupervised Semantic Similarity Computation between Terms Using Web Documents
Abstract— In this work, web-based metrics for semantic similarity computation between words or terms are presented and compared with the state-of-the-art. Starting from the funda...
Elias Iosif, Alexandros Potamianos
112
Voted
CORR
2010
Springer
157views Education» more  CORR 2010»
15 years 6 days ago
Stochastic Budget Optimization in Internet Advertising
Internet advertising is a sophisticated game in which the many advertisers "play" to optimize their return on investment. There are many "targets" for the adve...
Bhaskar DasGupta, S. Muthukrishnan
101
Voted
ASIACRYPT
2010
Springer
14 years 12 months ago
Improved Single-Key Attacks on 8-Round AES-192 and AES-256
Abstract. AES is the most widely used block cipher today, and its security is one of the most important issues in cryptanalysis. After 13 years of analysis, related-key attacks wer...
Orr Dunkelman, Nathan Keller, Adi Shamir