Sciweavers

1953 search results - page 321 / 391
» codes 2010
Sort
View
140
Voted
KBSE
2010
IEEE
15 years 2 months ago
Analyzing security architectures
We present a semi-automated approach, Secoria, for analyzing a security runtime architecture for security and for conformance to an object-oriented implementation. Typecheckable a...
Marwan Abi-Antoun, Jeffrey M. Barnes
138
Voted
KBSE
2010
IEEE
15 years 2 months ago
How did you specify your test suite
Although testing is central to debugging and software certification, there is no adequate language to specify test suites over source code. Such a language should be simple and c...
Andreas Holzer, Christian Schallhart, Michael Taut...
179
Voted
MEDIAFORENSICS
2010
15 years 2 months ago
Image dependent log-likelihood ratio allocation for repeat accumulate code-based decoding in data hiding channels
Error correction codes of suitable redundancy are used for ensuring perfect data recovery in noisy channels. For iterative decoding based methods, the decoder needs to be initiali...
Anindya Sarkar, B. S. Manjunath
127
Voted
MICS
2010
94views more  MICS 2010»
15 years 2 months ago
Arrangements on Parametric Surfaces I: General Framework and Infrastructure
We introduce a framework for the construction, maintenance, and manipulation of arrangements of curves embedded on certain two-dimensional orientable parametric surfaces in three-d...
Eric Berberich, Efi Fogel, Dan Halperin, Kurt Mehl...
137
Voted
ML
2010
ACM
155views Machine Learning» more  ML 2010»
15 years 2 months ago
On the infeasibility of modeling polymorphic shellcode - Re-thinking the role of learning in intrusion detection systems
Current trends demonstrate an increasing use of polymorphism by attackers to disguise their exploits. The ability for malicious code to be easily, and automatically, transformed in...
Yingbo Song, Michael E. Locasto, Angelos Stavrou, ...