Sciweavers

4911 search results - page 590 / 983
» Tree dependence analysis
Sort
View
NDSS
2008
IEEE
15 years 11 months ago
HookFinder: Identifying and Understanding Malware Hooking Behaviors
Installing various hooks into the victim system is an important attacking strategy employed by malware, including spyware, rootkits, stealth backdoors, and others. In order to def...
Heng Yin, Zhenkai Liang, Dawn Song
VTC
2008
IEEE
15 years 11 months ago
Impact of the Primary Network Activity on the Maximum Achievable Capacity of DS-CDMA/OFDM Spectrum Sharing
Abstract— In this paper, we analyze DS-CDMA/OFDM spectrum sharing system based on opportunistic spectrum access (OSA). In this system, the primary network air interface is based ...
Mohammad G. Khoshkholgh, Keivan Navaie, Halim Yani...
ICCV
2007
IEEE
15 years 11 months ago
A Multi-Image Restoration Method for Image Reconstruction from Projections
in Proc. IEEE Int’l Conf. on Computer Vision (ICCV), October, 2007 Traditional Bayesian restoration methods depend heavily on the accuracy of underlying generative models. For t...
Yunqiang Chen, Lin Cheng, Tong Fang, Rainer Raupac...
ICRA
2007
IEEE
102views Robotics» more  ICRA 2007»
15 years 11 months ago
On the Force Capabilities of Centripetal Force-actuated Microrobotic Platforms
—This paper studies the capabilities of a microrobotic platform, driven by vibrating motors, to generate and impart micromanipulation forces of desired type and magnitude. First,...
P. Vartholomeos, Kostas Vlachos, Evangelos Papadop...
SEFM
2007
IEEE
15 years 10 months ago
Hardness for Explicit State Software Model Checking Benchmarks
Directed model checking algorithms focus computation resources in the error-prone areas of concurrent systems. The algorithms depend on some empirical analysis to report their per...
Neha Rungta, Eric G. Mercer