Sciweavers

4307 search results - page 483 / 862
» Dynamic Spyware Analysis
Sort
View
JCIT
2010
113views more  JCIT 2010»
14 years 12 months ago
On Deriving an Equation of the Mutation Rate of the Hepatitis B Virus
The mutation rate of the hepatitis B virus (HBV) is often obtained by statistical software. This is restricted to the sampled data and cannot be applied to other cases. This limit...
Koun-Tem Sun, Chih-Hsuan Wei, Yi-Yu Hsu, Wen-Chun ...
JDCTA
2010
111views more  JDCTA 2010»
14 years 12 months ago
Internet as a "point of synergy" between communication and distribution: hypothesis of model applied to tourism
The wide diffusion of new technologies in communication and business has changed how consumer and product/store knowledge has to be managed and represented digitally. This issue h...
Pierpaolo Singer, Maria Antonella Ferri, Lucia Aie...
JDCTA
2010
175views more  JDCTA 2010»
14 years 12 months ago
Evolution Cipher against Differential Power Attack
: Differntial Power Attack (DPA) is one kind of Side Channel Attacks (SCAs). There are two phases in DPA attacks: sample collection and statistical analysis, which can be utilized ...
Shubo Liu, Ming Tang, Si Gao, Huanguo Zhang
TROB
2010
174views more  TROB 2010»
14 years 11 months ago
Force Tracking With Feed-Forward Motion Estimation for Beating Heart Surgery
The manipulation of fast moving, delicate tissues in beating heart procedures presents a considerable challenge to the surgeon. A robotic force tracking system can assist the surge...
Shelten G. Yuen, Douglas P. Perrin, Nikolay V. Vas...
JAISE
2011
238views more  JAISE 2011»
14 years 11 months ago
A bio-inspired system model for interactive surveillance applications
Advances in computer vision and pattern recognition research are leading to video surveillance systems with improved scene analysis capabilities. However, up to now few works have ...
Alessio Dore, Matteo Pinasco, Lorenzo Ciardelli, C...