Sciweavers

48 search results - page 8 / 10
» Controlled Procedural Terrain Generation Using Software Agen...
Sort
View
PEPM
2010
ACM
14 years 4 months ago
Context-sensitive analysis of obfuscated x86 executables
A method for context-sensitive analysis of binaries that may have obfuscated procedure call and return operations is presented. Such binaries may use operators to directly manipul...
Arun Lakhotia, Davidson R. Boccardo, Anshuman Sing...
ICSE
2009
IEEE-ACM
14 years 8 months ago
Analyzing critical process models through behavior model synthesis
Process models capture tasks performed by agents together with their control flow. Building and analyzing such models is important but difficult in certain areas such as safety-cr...
Christophe Damas, Bernard Lambeau, Francois Roucou...
INTERACT
2003
13 years 8 months ago
Programmorphosis: a Knowledge-Based Approach to End-User Programming
: Whereas sophisticated computer users can exercise more control in what they are exposed to and produce computational artifacts, technologically challenged end-users assume a more...
Andri Ioannidou
MIE
2008
117views Healthcare» more  MIE 2008»
13 years 8 months ago
An electronic registry for physiotherapists in Belgium
This paper describes the results of the KINELECTRICS project. Since more and more clinical documents are stored and transmitted in an electronic way, the aim of this project was to...
Ronald Buyl, Marc Nyssen
TCAD
2010
133views more  TCAD 2010»
13 years 2 months ago
Defect-Tolerant Design and Optimization of a Digital Microfluidic Biochip for Protein Crystallization
Protein crystallization is a commonly used technique for protein analysis and subsequent drug design. It predicts the 3-D arrangement of the constituent amino acids, which in turn ...
Tao Xu, Krishnendu Chakrabarty, Vamsee K. Pamula