Sciweavers

36 search results - page 6 / 8
» The Craft of Programming
Sort
View
ICRA
2006
IEEE
150views Robotics» more  ICRA 2006»
15 years 3 months ago
Navigation of Unmanned Marine Vehicles in Accordance with the Rules of the Road
Abstract— This paper is concerned with the in-field autonomous operation of unmanned marine vehicles in accordance with convention for safe and proper collision avoidance as pre...
Michael R. Benjamin, Joseph A. Curcio, John J. Leo...
ACSAC
1999
IEEE
15 years 1 months ago
Security Relevancy Analysis on the Registry of Windows NT 4.0
Many security breaches are caused by inappropriate inputs crafted by people with malicious intents. To enhance the system security, we need either to ensure that inappropriate inp...
Wenliang Du, Praerit Garg, Aditya P. Mathur
PLDI
2012
ACM
12 years 12 months ago
Diderot: a parallel DSL for image analysis and visualization
Research scientists and medical professionals use imaging technology, such as computed tomography (CT) and magnetic resonance imaging (MRI) to measure a wide variety of biological...
Charisee Chiw, Gordon Kindlmann, John Reppy, Lamon...
87
Voted
SIGMOD
2010
ACM
215views Database» more  SIGMOD 2010»
15 years 1 months ago
Dynamic symbolic database application testing
A database application differs form regular applications in that some of its inputs may be database queries. The program will execute the queries on a database and may use any re...
Chengkai Li, Christoph Csallner
80
Voted
CCS
2009
ACM
15 years 25 days ago
Filter-resistant code injection on ARM
Code injections attacks are one of the most powerful and important classes of attacks on software. In such attacks, the attacker sends malicious input to a software application, w...
Yves Younan, Pieter Philippaerts, Frank Piessens, ...