Sciweavers

1227 search results - page 206 / 246
» Using Generation for Grammar Analysis and Error Detection
Sort
View
JPDC
2007
112views more  JPDC 2007»
14 years 9 months ago
CHEMAS: Identify suspect nodes in selective forwarding attacks
Selective forwarding attacks may corrupt some mission-critical applications such as military surveillance and forest fire monitoring in wireless sensor networks. In such attacks,...
Bin Xiao, Bo Yu, Chuanshan Gao
DSN
2005
IEEE
15 years 3 months ago
Authenticated System Calls
System call monitoring is a technique for detecting and controlling compromised applications by checking at runtime that each system call conforms to a policy that specifies the ...
Mohan Rajagopalan, Matti A. Hiltunen, Trevor Jim, ...
CCS
2008
ACM
14 years 11 months ago
Towards automatic reverse engineering of software security configurations
The specifications of an application's security configuration are crucial for understanding its security policies, which can be very helpful in security-related contexts such...
Rui Wang 0010, XiaoFeng Wang, Kehuan Zhang, Zhuowe...
MEDIAFORENSICS
2010
14 years 11 months ago
Forensic hash for multimedia information
Digital multimedia such as images and videos are prevalent on today's internet and cause significant social impact, which can be evidenced by the proliferation of social netw...
Wenjun Lu, Avinash L. Varna, Min Wu
MM
2010
ACM
182views Multimedia» more  MM 2010»
14 years 10 months ago
Joke-o-Mat HD: browsing sitcoms with human derived transcripts
Joke-o-mat HD is a system that allows a user to navigate sitcoms (such as Seinfeld) by "narrative themes", including scenes, punchlines, and dialog segments. The themes ...
Adam Janin, Luke R. Gottlieb, Gerald Friedland