Sciweavers

5799 search results - page 1057 / 1160
» Position Paper
Sort
View
116
Voted
IEEEIAS
2009
IEEE
15 years 10 months ago
Modeling the Co-evololution DNS Worms and Anti-worms in IPv6 Networks
A computer worm is an autonomous malicious, selfreplicating and propagating piece of code that is able to spread fast in computer networks, exploiting the vulnerabilities it disco...
Pantelis Kammas, Thodoros Komninos, Yannis C. Stam...
INFOCOM
2009
IEEE
15 years 10 months ago
Detecting Spam Zombies by Monitoring Outgoing Messages
—Compromised machines are one of the key security threats on the Internet; they are often used to launch various security attacks such as DDoS, spamming, and identity theft. In t...
Zhenhai Duan, Peng Chen, Fernando Sanchez, Yingfei...
127
Voted
IROS
2009
IEEE
224views Robotics» more  IROS 2009»
15 years 10 months ago
Humanoid motion planning for dual-arm manipulation and re-grasping tasks
— In this paper, we present efficient solutions for planning motions of dual-arm manipulation and re-grasping tasks. Motion planning for such tasks on humanoid robots with a hig...
Niko Vahrenkamp, Dmitry Berenson, Tamim Asfour, Ja...
IROS
2009
IEEE
137views Robotics» more  IROS 2009»
15 years 10 months ago
A framework for planning comfortable and customizable motion of an assistive mobile robot
Abstract— Assistive mobile robots that can navigate autonomously can greatly benefit people with mobility impairments. Since an assistive mobile robot transports a human user fr...
Shilpa Gulati, Chetan Jhurani, Benjamin Kuipers, R...
138
Voted
IROS
2009
IEEE
187views Robotics» more  IROS 2009»
15 years 10 months ago
Compliant quadruped locomotion over rough terrain
— Many critical elements for statically stable walking for legged robots have been known for a long time, including stability criteria based on support polygons, good foothold se...
Jonas Buchli, Mrinal Kalakrishnan, Michael Mistry,...
« Prev « First page 1057 / 1160 Last » Next »