Sciweavers

4790 search results - page 487 / 958
» Reverse Query Processing
Sort
View
ACSAC
2007
IEEE
15 years 11 months ago
Spector: Automatically Analyzing Shell Code
Detecting the presence of buffer overflow attacks in network messages has been a major focus. Only knowing whether a message contains an attack, however, is not always enough to m...
Kevin Borders, Atul Prakash, Mark Zielinski
ECBS
2007
IEEE
144views Hardware» more  ECBS 2007»
15 years 11 months ago
DP-Miner: Design Pattern Discovery Using Matrix
Design patterns document expert design experience in software system development. They have been applied in many existing software systems. However, pattern information is general...
Jing Dong, Dushyant S. Lad, Yajing Zhao
ICRA
2007
IEEE
154views Robotics» more  ICRA 2007»
15 years 11 months ago
Directional Adhesive Structures for Controlled Climbing on Smooth Vertical Surfaces
— Recent biological research suggests that reliable, agile climbing on smooth vertical surfaces requires controllable adhesion. In nature, geckos control adhesion by properly loa...
Daniel Santos, Sangbae Kim, Matthew Spenko, Aaron ...
SMI
2007
IEEE
194views Image Analysis» more  SMI 2007»
15 years 11 months ago
Robust Smooth Feature Extraction from Point Clouds
Defining sharp features in a given 3D model facilitates a better understanding of the surface and aids visualizations, reverse engineering, filtering, simplification, non-photo...
Joel Daniels II, Linh K. Ha, Tilo Ochotta, Cl&aacu...
ACSC
2006
IEEE
15 years 11 months ago
Manufacturing opaque predicates in distributed systems for code obfuscation
Code obfuscation is a relatively new technique of software protection and it works by deterring reverse engineering attempts by malicious users of software. The objective of obfus...
Anirban Majumdar, Clark D. Thomborson