Sciweavers

12289 search results - page 2383 / 2458
» computer 2006
Sort
View
102
Voted
SCAM
2006
IEEE
15 years 6 months ago
Bug Classification Using Program Slicing Metrics
In this paper, we introduce 13 program slicing metrics for C language programs. These metrics use program slice information to measure the size, complexity, coupling, and cohesion...
Kai Pan, Sunghun Kim, E. James Whitehead Jr.
111
Voted
SMI
2006
IEEE
168views Image Analysis» more  SMI 2006»
15 years 6 months ago
Spherical Wavelet Descriptors for Content-based 3D Model Retrieval
The description of 3D shapes with features that possess descriptive power and invariant under similarity transformations is one of the most challenging issues in content based 3D ...
Hamid Laga, Hiroki Takahashi, Masayuki Nakajima
101
Voted
SP
2006
IEEE
132views Security Privacy» more  SP 2006»
15 years 6 months ago
Towards Automatic Generation of Vulnerability-Based Signatures
In this paper we explore the problem of creating vulnerability signatures. A vulnerability signature matches all exploits of a given vulnerability, even polymorphic or metamorphic...
David Brumley, James Newsome, Dawn Xiaodong Song, ...
91
Voted
SP
2006
IEEE
100views Security Privacy» more  SP 2006»
15 years 6 months ago
Fundamental Limits on the Anonymity Provided by the MIX Technique
The MIX technique forms the basis of many popular services that offer anonymity of communication in open and shared networks such as the Internet. In this paper, fundamental limit...
Dogan Kesdogan, Dakshi Agrawal, Dang Vinh Pham, Di...
101
Voted
SP
2006
IEEE
148views Security Privacy» more  SP 2006»
15 years 6 months ago
SubVirt: Implementing malware with virtual machines
Attackers and defenders of computer systems both strive to gain complete control over the system. To maximize their control, both attackers and defenders have migrated to low-leve...
Samuel T. King, Peter M. Chen, Yi-Min Wang, Chad V...
« Prev « First page 2383 / 2458 Last » Next »