Sciweavers

577 search results - page 55 / 116
» Engineering Sufficiently Secure Computing
Sort
View
ESSOS
2010
Springer
15 years 12 months ago
Idea: Opcode-Sequence-Based Malware Detection
Malware is every malicious code that has the potential to harm any computer or network. The amount of malware is increasing faster every year and poses a serious security threat. H...
Igor Santos, Felix Brezo, Javier Nieves, Yoseba K....
DAC
2007
ACM
16 years 4 months ago
Accurate Waveform Modeling using Singular Value Decomposition with Applications to Timing Analysis
It is known that ramp-based models are not sufficient for accurate timing modeling. In this paper, we develop a technique that accurately models the waveforms, and also allows a f...
Anand Ramalingam, Ashish Kumar Singh, Sani R. Nass...
CCECE
2006
IEEE
15 years 9 months ago
Software Defect Content Estimation: A Bayesian Approach
Software inspection is a method to detect errors in software artefacts early in the development cycle. At the end of the inspection process the inspectors need to make a decision ...
Achin Jain, Alok R. Patnaik, Pulak Dhar, Vineet Sr...
ICRA
2002
IEEE
127views Robotics» more  ICRA 2002»
15 years 8 months ago
Design and Control of a Three-Link Serial Manipulator for Lessons in Particle Dynamics
Design, control, and performance of a ball-throwing robot are examined in this paper. The objective of this project is to provide an interactive ball-throwing robotic arm for illu...
Mark A. Minor, Kent Jensen, Youngshik Kim
AOSD
2007
ACM
15 years 7 months ago
Fully abstract semantics of additive aspects by translation
stract Semantics of Additive Aspects by Translation S. B. Sanjabi C.-H. L. Ong Oxford University Computing Laboratory We study the denotational semantics of an aspect calculus by ...
S. B. Sanjabi, C.-H. Luke Ong