In this paper, we address the problem of static slicing on binary executables for the purposes of the malicious code detection in COTS components. By operating directly on binary ...
J. Bergeron, Mourad Debbabi, M. M. Erhioui, B&eacu...
Abstract--Recent spates of cyber-attacks and frequent emergence of applications affecting Internet traffic dynamics have made it imperative to develop effective techniques that can...
This paper presents a systematic methodology to create customized structural macromodels for a specific analog circuit. The novel contributions of the method include definition of...
— The control of humanoid manipulators is very challenging due to the large number of degrees of freedom and the resulting redundancy. Using joint-level control complex planning ...
— We address in this paper the problem of the autonomous online learning of a sensory-motor task, demonstrated by an operator guiding the robot. For the last decade, we have deve...