Sciweavers

683 search results - page 73 / 137
» Vulnerability Analysis of High Dimensional Complex Systems
Sort
View
SIGSOFT
2003
ACM
16 years 1 months ago
Protecting C programs from attacks via invalid pointer dereferences
Writes via unchecked pointer dereferences rank high among vulnerabilities most often exploited by malicious code. The most common attacks use an unchecked string copy to cause a b...
Suan Hsi Yong, Susan Horwitz
143
Voted
SOUPS
2010
ACM
15 years 4 months ago
A closer look at recognition-based graphical passwords on mobile devices
Graphical password systems based on the recognition of photographs are candidates to alleviate current over-reliance on alphanumeric passwords and PINs. However, despite being bas...
Paul Dunphy, Andreas P. Heiner, N. Asokan
CAIP
2007
Springer
217views Image Analysis» more  CAIP 2007»
15 years 6 months ago
Mixture Models Based Background Subtraction for Video Surveillance Applications
— Background subtraction is a method commonly used to segment objects of interest in image sequences. By comparing new frames to a background model, regions of interest can be fo...
Chris Poppe, Gaëtan Martens, Peter Lambert, R...
ICFEM
2007
Springer
15 years 6 months ago
Machine-Assisted Proof Support for Validation Beyond Simulink
Simulink is popular in industry for modeling and simulating embedded systems. It is deficient to handle requirements of high-level assurance and timing analysis. Previously, we sh...
Chunqing Chen, Jin Song Dong, Jun Sun 0001
99
Voted
COMPSAC
2006
IEEE
15 years 6 months ago
Performance Analysis of an Asynchronous Web Server
Modern Web servers need to process multiple requests concurrently in order to fulfill the workload demands expected of them. Concurrency can be implemented in a Web server using ...
U. Praphamontripong, Swapna S. Gokhale, Aniruddha ...