Sciweavers

8177 search results - page 290 / 1636
» Detecting System Emulators
Sort
View
WORM
2003
15 years 4 months ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...
ENTCS
2006
172views more  ENTCS 2006»
15 years 3 months ago
Efficient Detection of Conflicts in Graph-based Model Transformation
Using graph transformation as a formalism to specify model transformation, termination and confluence of the graph transformation system are often required properties. Only under ...
Leen Lambers, Hartmut Ehrig, Fernando Orejas
ICAC
2009
IEEE
15 years 10 months ago
Out-of-band detection of boot-sequence termination events
The popularization of both virtualization and CDP technologies mean that we can now watch disk accesses of systems from entities which are not controlled by the OS. This is a rich...
Naama Parush, Dan Pelleg, Muli Ben-Yehuda, Paula T...
ICMI
2009
Springer
198views Biometrics» more  ICMI 2009»
15 years 10 months ago
Detecting, tracking and interacting with people in a public space
We have built a system that engages naive users in an audiovisual interaction with a computer in an unconstrained public space. We combine audio source localization techniques wit...
Sunsern Cheamanunkul, Evan Ettinger, Matt Jacobsen...
142
Voted
IPMI
2005
Springer
15 years 8 months ago
Automated Detection of Small-Size Pulmonary Nodules Based on Helical CT Images
Abstract. A computer-aided diagnosis (CAD) system to detect smallsize (from 2 mm to around 10 mm) pulmonary nodules in helical CT scans is developed. This system uses different sc...
Xiangwei Zhang, Geoffrey McLennan, Eric A. Hoffman...