Sciweavers

1186 search results - page 214 / 238
» Analysis of Virtual Workspaces
Sort
View
ACSAC
2005
IEEE
14 years 2 months ago
Stealth Breakpoints
Microscopic analysis of malicious code (malware) requires the aid of a variety of powerful tools. Chief among them is a debugger that enables runtime binary analysis at an instruc...
Amit Vasudevan, Ramesh Yerraballi
ICRA
2002
IEEE
181views Robotics» more  ICRA 2002»
14 years 1 months ago
The BlueDRAGON - A System for Measuring the Kinematics and the Dynamics of Minimally Invasive Surgical Tools In-Vivo
Minimally invasive surgery (MIS) involves a multidimensional series of tasks requiring a synthesis between visual information and the kinematics and dynamics of the surgical tools...
Jacob Rosen, Jeffrey D. Brown, Lily Chang, Marco B...
NSDI
2010
13 years 10 months ago
Mugshot: Deterministic Capture and Replay for JavaScript Applications
Mugshot is a system that captures every event in an executing JavaScript program, allowing developers to deterministically replay past executions of web applications. Replay is us...
James Mickens, Jeremy Elson, Jon Howell
DAGSTUHL
2006
13 years 10 months ago
A Petri Net Approach to Verify and Debug Simulation Models
Verification and Simulation share many issues, one is that simulation models require validation and verification. In the context of simulation, verification is understood as the ta...
Peter Kemper, Carsten Tepper
IJMMS
2007
91views more  IJMMS 2007»
13 years 8 months ago
Mining communities and their relationships in blogs: A study of online hate groups
Blogs, often treated as the equivalence of online personal diaries, have become one of the fastest growing types of Web-based media. Everyone is free to express their opinions and...
Michael Chau, Jennifer Jie Xu