Sciweavers

545 search results - page 11 / 109
» An algorithm for amplitude-constrained input design for syst...
Sort
View
SOSP
2007
ACM
14 years 4 months ago
Bouncer: securing software by blocking bad input
Attackers exploit software vulnerabilities to control or crash programs. Bouncer uses existing software instrumentation techniques to detect attacks and it generates filters auto...
Manuel Costa, Miguel Castro, Lidong Zhou, Lintao Z...
DAC
2008
ACM
14 years 8 months ago
Automated hardware-independent scenario identification
Scenario-based design exploits the time-varying execution behavior of applications by dynamically adapting the system on which they run. This is a particularly interesting design ...
Juan Hamers, Lieven Eeckhout
CDC
2009
IEEE
139views Control Systems» more  CDC 2009»
14 years 3 days ago
A bio-plausible design for visual attitude stabilization
— We consider the problem of attitude stabilization using exclusively visual sensory input, and we look for a solution which can satisfy the constraints of a “bio-plausible” ...
Andrea Censi, Shuo Han, Sawyer B. Fuller, Richard ...
HAPTICS
2002
IEEE
14 years 10 days ago
System Identification of the Human Hand Grasping a Haptic Knob
Accurate dynamic models of human hands grasping haptic devices can help to inform stability analyses, control algorithms, device design, and technology development efforts. The cu...
Christopher J. Hasser, Mark R. Cutkosky
BMCBI
2010
94views more  BMCBI 2010»
13 years 7 months ago
A high-throughput pipeline for the design of real-time PCR signatures
Background: Pathogen diagnostic assays based on polymerase chain reaction (PCR) technology provide high sensitivity and specificity. However, the design of these diagnostic assays...
Ravi Vijaya Satya, Kamal Kumar, Nela Zavaljevski, ...