Sciweavers

4307 search results - page 546 / 862
» Dynamic Spyware Analysis
Sort
View
ISSTA
2010
ACM
15 years 8 months ago
Automatic detection of unsafe component loadings
Dynamic loading of software components (e.g., libraries or modules) is a widely used mechanism for improved system modularity and flexibility. Correct component resolution is cri...
Taeho Kwon, Zhendong Su
DIMVA
2009
15 years 5 months ago
A Service Dependency Modeling Framework for Policy-Based Response Enforcement
The use of dynamic access control policies for threat response adapts local response decisions to high level system constraints. However, security policies are often carefully tigh...
Nizar Kheir, Hervé Debar, Fréd&eacut...
IJRR
2006
110views more  IJRR 2006»
15 years 4 months ago
Optimal Mass Distribution for Passivity-Based Bipedal Robots
This paper reports how and to what extent the mass distribution of a passive dynamic walker can be tuned to maximize walking speed and stability. An exploration of the complete pa...
Joachim Haß, J. Michael Herrmann, Theo Geise...
MICCAI
2008
Springer
16 years 5 months ago
A Novel Explicit 2D+t Cyclic Shape Model Applied to Echocardiography
In this paper, we propose a novel explicit 2D+t cyclic shape model that extends the Point Distribution Model (PDM) to shapes like myocardial contours with cyclic dynamics. We also ...
Ramón Casero, J. Alison Noble
STOC
2004
ACM
61views Algorithms» more  STOC 2004»
16 years 4 months ago
The zero-one principle for switching networks
Recently, approximation analysis has been extensively used to study algorithms for routing weighted packets in various network settings. Although different techniques were applied...
Yossi Azar, Yossi Richter