Sciweavers

950 search results - page 102 / 190
» Constraint Based Resilience Analysis
Sort
View
SP
2006
IEEE
132views Security Privacy» more  SP 2006»
14 years 3 months ago
Towards Automatic Generation of Vulnerability-Based Signatures
In this paper we explore the problem of creating vulnerability signatures. A vulnerability signature matches all exploits of a given vulnerability, even polymorphic or metamorphic...
David Brumley, James Newsome, Dawn Xiaodong Song, ...
ICIAR
2004
Springer
14 years 2 months ago
Real Time Multiple Object Tracking Based on Active Contours
Abstract. In this paper our purpose is to present some solutions to multiple object tracking in an image sequence with a real time constraint and a possible mobile camera. We propo...
Sébastien Lefèvre, Nicole Vincent
ICRA
2002
IEEE
187views Robotics» more  ICRA 2002»
14 years 1 months ago
Trajectory Planning using Reachable-State Density Functions
:This paper presents a trajectory planning algorithm for mobile robots which may be subject to kinodynamic constraints. Using computational methods from noncommutative harmonic ana...
Richard Mason, Joel W. Burdick
VL
2005
IEEE
105views Visual Languages» more  VL 2005»
14 years 2 months ago
A Formal Approach to the Generation of Visual Language Environments Supporting Multiple Views
In this paper we present a formal approach, based on meta-modelling and graph transformation, to the generation of environments for visual languages (VLs) supporting multiple view...
Esther Guerra, Paloma Díaz, Juan de Lara
ENTCS
2010
133views more  ENTCS 2010»
13 years 3 months ago
Inference of Session Types From Control Flow
This is a study of a technique for deriving the session type of a program written in a statically typed imperative language from its control flow. We impose on our unlabelled sess...
Peter Collingbourne, Paul H. J. Kelly