Sciweavers

2210 search results - page 243 / 442
» Applying a Model-based Approach for Embedded System Developm...
Sort
View

Publication
148views
15 years 4 months ago
ADSandbox: sandboxing JavaScript to fight malicious websites
We present ADSandbox, an analysis system for malicious websites that focusses on detecting attacks through JavaScript. Since, in contrast to Java, JavaScript does not have any bui...
CDC
2009
IEEE
166views Control Systems» more  CDC 2009»
15 years 7 months ago
Idempotent method for dynamic games and complexity reduction in min-max expansions
— In recent years, idempotent methods (specifically, max-plus methods) have been developed for solution of nonlinear control problems. It was thought that idempotent linearity o...
William M. McEneaney
EUC
2007
Springer
15 years 9 months ago
Palpability Support Demonstrated
Abstract. In ubiquitous computing, as more and more devices are embedded into the environment, there is a risk that the user loses the understanding of the system. In normal use th...
Jeppe Brønsted, Erik Grönvall, David F...
AVSS
2009
IEEE
15 years 28 days ago
Landmark Localisation in 3D Face Data
A comparison of several approaches that use graph matching and cascade filtering for landmark localisation in 3D face data is presented. For the first method, we apply the structur...
Marcelo Romero, Nick Pears
ACSC
2006
IEEE
15 years 9 months ago
Interaction design for a mobile context-aware system using discrete event modelling
This paper describes our experience when applying formal methods in the design of the tourist information system TIP, which presents context-sensitive information to mobile users ...
Annika Hinze, Petra Malik, Robi Malik