Sciweavers

352 search results - page 42 / 71
» Evaluating the imprecision of static analysis
Sort
View
ACSAC
2007
IEEE
15 years 8 months ago
MetaAware: Identifying Metamorphic Malware
Detection of malicious software (malware) by the use of static signatures is often criticized for being overly simplistic. Available methods of obfuscating code (so-called metamor...
Qinghua Zhang, Douglas S. Reeves
INFOCOM
2006
IEEE
15 years 8 months ago
Supporting Secure Communication and Data Collection in Mobile Sensor Networks
— Sensor deployments may be static, but researchers have recently been making a case for mobile collector nodes to enhance data acquisition. Since mobile nodes are often more pri...
Li Zhou, Jinfeng Ni, Chinya V. Ravishankar
SCAM
2003
IEEE
15 years 7 months ago
Design and Implementation of Bytecode-based Java Slicing System
Program slice is a set of statements that affect the value of variable v in a statement s. In order to calculate a program slice, we must know the dependence relations between sta...
Fumiaki Umemori, Kenji Konda, Reishi Yokomori, Kat...
AAAI
1998
15 years 3 months ago
Eye Finding via Face Detection for a Foveated Active Vision System
Eye finding is the first step toward building a machine that can recognize social cues, like eye contact and gaze direction, in a natural context. In this paper, we present a real...
Brian Scassellati
FGR
2011
IEEE
340views Biometrics» more  FGR 2011»
14 years 5 months ago
Action unit detection using sparse appearance descriptors in space-time video volumes
— Recently developed appearance descriptors offer the opportunity for efficient and robust facial expression recognition. In this paper we investigate the merits of the family o...
Bihan Jiang, Michel François Valstar, Maja ...