We perform host-based intrusion detection by constructing a model from a program’s binary code and then restricting the program’s execution by the model. We improve the effecti...
Jonathon T. Giffin, David Dagon, Somesh Jha, Wenke...
This paper proposes an approach for surface reconstruction of free-form rigid objects from an arbitrary set of intersecting range curves. A strategy for updating the reconstructed...
Translating data and data access operations between applications and databases is a longstanding data management problem. We present a novel approach to this problem, in which the...
As embedded systems grow increasingly complex, there is a pressing need for diagnosing and monitoring capabilities that estimate the system state robustly. This paper is based on ...
: This paper develops methodology and technique for pose tracking of an autonomous mobile robot (AMR) using a laser scanner. A low-complexity and accurate pose-tracking EKF-based a...