Sciweavers

1737 search results - page 190 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
ICIP
2009
IEEE
16 years 6 months ago
Circular Blurred Shape Model For Symbol Spotting In Documents
Symbol spotting problem requires feature extraction strategies able to generalize from training samples and to localize the target object while discarding most part of the image. ...
178
Voted
ACSAC
2009
IEEE
15 years 12 months ago
Analyzing Information Flow in JavaScript-Based Browser Extensions
JavaScript-based browser extensions (JSEs) enhance the core functionality of web browsers by improving their look and feel, and are widely available for commodity browsers. To ena...
Mohan Dhawan, Vinod Ganapathy
CIMCA
2008
IEEE
15 years 11 months ago
Space Based Architecture for Numerical Solving
A strategy for the analytical solving of ordinary differential equations and a first implementation of it based on mobile agent community, using jini javaspace framework, are pre...
Cyril Dumont, Fabrice Mourlin
PODS
2010
ACM
306views Database» more  PODS 2010»
15 years 10 months ago
Optimizing linear counting queries under differential privacy
Differential privacy is a robust privacy standard that has been successfully applied to a range of data analysis tasks. But despite much recent work, optimal strategies for answe...
Chao Li, Michael Hay, Vibhor Rastogi, Gerome Mikla...
169
Voted
ACSAC
2007
IEEE
15 years 11 months ago
Improving Signature Testing through Dynamic Data Flow Analysis
The effectiveness and precision of network-based intrusion detection signatures can be evaluated either by direct analysis of the signatures (if they are available) or by using bl...
Christopher Kruegel, Davide Balzarotti, William K....