Sciweavers

4307 search results - page 700 / 862
» Dynamic Spyware Analysis
Sort
View
NDSS
2009
IEEE
14 years 3 months ago
K-Tracer: A System for Extracting Kernel Malware Behavior
Kernel rootkits can provide user level-malware programs with the additional capabilities of hiding their malicious activities by altering the legitimate kernel behavior of an oper...
Andrea Lanzi, Monirul I. Sharif, Wenke Lee
ICRA
2009
IEEE
156views Robotics» more  ICRA 2009»
14 years 3 months ago
Aerodynamics of dragonfly flight and robotic design
—A pair of dynamically scaled robotic dragonfly model wings was developed to investigate the aerodynamic effect of wing-wing interaction in dragonfly flight. Instantaneous aerody...
Zheng Hu, Raymond McCauley, Steve Schaeffer, Xinya...
IROS
2009
IEEE
152views Robotics» more  IROS 2009»
14 years 3 months ago
EMG-to-force estimation with full-scale physiology based muscle model
— EMG-to-force estimation for voluntary muscle contraction has many applications in human-machine interaction, motion analysis, and rehabilitation robotics for prosthetic limbs o...
Mitsuhiro Hayashibe, David Guiraud, Philippe Poign...
WABI
2009
Springer
162views Bioinformatics» more  WABI 2009»
14 years 3 months ago
Aligning Biomolecular Networks Using Modular Graph Kernels
Comparative analysis of biomolecular networks constructed using measurements from different conditions, tissues, and organisms offer a powerful approach to understanding the stru...
Fadi Towfic, M. Heather West Greenlee, Vasant Hona...
CAISE
2009
Springer
14 years 3 months ago
Evaluation Patterns for Analyzing the Costs of Enterprise Information Systems
Introducing enterprise information systems (EIS) is usually associated with high costs. It is therefore crucial to understand those factors that determine or influence these costs...
Bela Mutschler, Manfred Reichert