Sciweavers

1523 search results - page 286 / 305
» Detecting and Sketching the Common
Sort
View
DIMVA
2008
14 years 10 months ago
Data Space Randomization
Over the past several years, US-CERT advisories, as well as most critical updates from software vendors, have been due to memory corruption vulnerabilities such as buffer overflo...
Sandeep Bhatkar, R. Sekar
AAAI
2010
14 years 9 months ago
Biped Walk Learning Through Playback and Corrective Demonstration
Developing a robust, flexible, closed-loop walking algorithm for a humanoid robot is a challenging task due to the complex dynamics of the general biped walk. Common analytical ap...
Çetin Meriçli, Manuela M. Veloso
CCS
2010
ACM
14 years 9 months ago
HyperSentry: enabling stealthy in-context measurement of hypervisor integrity
This paper presents HyperSentry, a novel framework to enable integrity measurement of a running hypervisor (or any other highest privileged software layer on a system). Unlike exi...
Ahmed M. Azab, Peng Ning, Zhi Wang, Xuxian Jiang, ...
SOFTVIS
2010
ACM
14 years 9 months ago
AllocRay: memory allocation visualization for unmanaged languages
A programs memory system performance is one of the key determinants of its overall performance. Lack of understanding of a programs memory system behavior can lead to performance ...
George G. Robertson, Trishul M. Chilimbi, Bongshin...
AROBOTS
2008
77views more  AROBOTS 2008»
14 years 9 months ago
Extending obstacle avoidance methods through multiple parameter-space transformations
Obstacle avoidance methods approach the problem of mobile robot autonomous navigation by steering the robot in real-time according to the most recent sensor readings, being suitab...
Jose-Luis Blanco, Javier Gonzalez, Juan-Antonio Fe...