Sciweavers

6104 search results - page 1105 / 1221
» Constructing Information Bases Using Associative Structures
Sort
View
SP
2009
IEEE
262views Security Privacy» more  SP 2009»
15 years 10 months ago
Automatic Reverse Engineering of Malware Emulators
Malware authors have recently begun using emulation technology to obfuscate their code. They convert native malware binaries into bytecode programs written in a randomly generated...
Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffi...
126
Voted
SASO
2008
IEEE
15 years 9 months ago
Hierarchical Organizations and a Supporting Software Architecture for Floating Car Data
The use of floating car data is an interesting method to monitor traffic. Vehicles act as local traffic sensors and data from individual vehicles is aggregated into higher-leve...
Robrecht Haesevoets, Danny Weyns, Tom Holvoet, Wou...
151
Voted
CIRA
2007
IEEE
130views Robotics» more  CIRA 2007»
15 years 9 months ago
Compliant Formation Control of a Multi-Vehicle System
— This research identifies a strategy called compliant formation control, which may be used to coordinate the navigational structure of a team of autonomous vehicles. This techni...
Erica Z. MacArthur, Carl D. Crane III
129
Voted
ICRA
2007
IEEE
225views Robotics» more  ICRA 2007»
15 years 9 months ago
Accurate Quadrifocal Tracking for Robust 3D Visual Odometry
— This paper describes a new image-based approach to tracking the 6dof trajectory of a stereo camera pair using a corresponding reference image pairs instead of explicit 3D featu...
Andrew I. Comport, Ezio Malis, Patrick Rives
139
Voted
RTCSA
2005
IEEE
15 years 9 months ago
Scheduling Support for Guaranteed Time Services in IEEE 802.15.4 Low Rate WPAN
We propose a real-time message scheduling algorithm which is applied to schedule periodic realtime messages in IEEE 802.15.4 for LR-WPAN(Low Rate Wireless Personal Area Network). ...
Seongeun Yoo, Daeyoung Kim, Minh-Long Pham, Yoonme...
« Prev « First page 1105 / 1221 Last » Next »