Sciweavers

19 search results - page 2 / 4
» Synthesizing Protection Monitors from Causal Structure
Sort
View
ACSAC
2009
IEEE
14 years 18 hour ago
Protecting Commodity Operating System Kernels from Vulnerable Device Drivers
Device drivers on commodity operating systems execute with kernel privilege and have unfettered access to kernel data structures. Several recent attacks demonstrate that such poor...
Shakeel Butt, Vinod Ganapathy, Michael M. Swift, C...
BMCBI
2011
13 years 6 days ago
Using Stochastic Causal Trees to Augment Bayesian Networks for Modeling eQTL Datasets
Background: The combination of genotypic and genome-wide expression data arising from segregating populations offers an unprecedented opportunity to model and dissect complex phen...
Kyle C. Chipman, Ambuj K. Singh
PAMI
1998
116views more  PAMI 1998»
13 years 4 months ago
Scale-Space Derived From B-Splines
—It is well-known that the linear scale-space theory in computer vision is mainly based on the Gaussian kernel. The purpose of the paper is to propose a scale-space theory based ...
Yu-Ping Wang, Seng Luan Lee
ICRA
1995
IEEE
125views Robotics» more  ICRA 1995»
13 years 8 months ago
Inductive Generation of Diagnostic Knowledge for Autonomous Assembly
A generic architecture for evolutive supervision of robotized assembly tasks is presented. This architecture , at different levels of abstraction, functions for dispatching action...
Luís Seabra Lopes, Luis M. Camarinha-Matos
DSN
2009
IEEE
13 years 12 months ago
On the effectiveness of structural detection and defense against P2P-based botnets
Recently, peer-to-peer (P2P) networks have emerged as a covert communication platform for malicious programs known as bots. As popular distributed systems, they allow bots to comm...
Duc T. Ha, Guanhua Yan, Stephan Eidenbenz, Hung Q....