Sciweavers

758 search results - page 104 / 152
» Coding Exon Detection Using Comparative Sequences
Sort
View
SP
2007
IEEE
107views Security Privacy» more  SP 2007»
14 years 5 months ago
Lurking in the Shadows: Identifying Systemic Threats to Kernel Data
The integrity of kernel code and data is fundamental to the integrity of the computer system. Tampering with the kernel data is an attractive venue for rootkit writers since malic...
Arati Baliga, Pandurang Kamat, Liviu Iftode
ICC
2007
IEEE
125views Communications» more  ICC 2007»
14 years 5 months ago
A Novel Concept: Message Driven Frequency Hopping (MDFH)
—Frequency hopping systems have been widely used in military communications to prevent hostile jamming, interception and detection. In traditional frequency hopping (FH) systems,...
Qi Ling, Tongtong Li, Zhi Ding
IFIP
2000
Springer
14 years 2 months ago
Test Case Design for the Validation of Component-Based Embedded Systems
The validation of functional and real-time requirements of control software for embedded systems is a difficult task. It usually needs the electronic control unit (ECU) and the co...
W. Fleisch
IJCAI
1989
14 years 5 days ago
Towards a Theory of Conflict Detection and Resolution in Nonlinear Plans
This paper deals with a well known problem in AI planning: detecting and resolving conflicts in nonlinear plans. We sketch a theory of restricted conflict detection and resolution...
Joachim Hertzberg, Alexander Horz
ECCV
2010
Springer
14 years 3 months ago
Geometric Constraints for Human Detection in Aerial Imagery
In this paper, we propose a method for detecting humans in imagery taken from a UAV. This is a challenging problem due to small number of pixels on target, which makes it more diï¬...