Sciweavers

232 search results - page 45 / 47
» Extension of Object-Oriented Software Testing Techniques to ...
Sort
View
CORR
2011
Springer
197views Education» more  CORR 2011»
12 years 9 months ago
Securing The Kernel via Static Binary Rewriting and Program Shepherding
Recent Microsoft security bulletins show that kernel vulnerabilities are becoming more and more important security threats. Despite the pretty extensive security mitigations many ...
Piotr Bania
IJRR
2011
159views more  IJRR 2011»
13 years 21 days ago
Visual-inertial navigation, mapping and localization: A scalable real-time causal approach
We present a model to estimate motion from monocular visual and inertial measurements. We analyze the model and characterize the conditions under which its state is observable, an...
Eagle Jones, Stefano Soatto
OTM
2005
Springer
13 years 11 months ago
Accessing X Applications over the World-Wide Web
Abstract. The X Protocol, an asynchronous network protocol, was developed at MIT amid the need to provide a network transparent graphical user interface primarily for the UNIX Oper...
Arno Puder, Siddharth Desai
BMCBI
2008
146views more  BMCBI 2008»
13 years 5 months ago
EST Express: PHP/MySQL based automated annotation of ESTs from expression libraries
Background: Several biological techniques result in the acquisition of functional sets of cDNAs that must be sequenced and analyzed. The emergence of redundant databases such as U...
Robin P. Smith, William J. Buchser, Marcus B. Lemm...
ATAL
2011
Springer
12 years 5 months ago
GUARDS: game theoretic security allocation on a national scale
Building on research previously reported at AAMAS conferences, this paper describes an innovative application of a novel gametheoretic approach for a national scale security deplo...
James Pita, Milind Tambe, Christopher Kiekintveld,...