In this paper, we address the problem of static slicing on binary executables for the purposes of the malicious code detection in COTS components. By operating directly on binary ...
J. Bergeron, Mourad Debbabi, M. M. Erhioui, B&eacu...
Java supports heterogeneous applications by transforming a heterogeneous network of machines into a homogeneous network of Java virtual machines. This abstracts over many of the c...
Gul Agha, Mark Astley, Jamil A. Sheikh, Carlos A. ...
A three-level functional architecture for a team of mobile robots is described in detail, including the de nition of the role assigned to each level, the main concepts involved, a...
Pedro U. Lima, Rodrigo M. M. Ventura, Pedro Apar&i...
Identifying human gaze or eye-movement ultimately serves the purpose of identifying an individual’s focus of attention. The knowledge of a person’s object of interest helps us...
Rainer Stiefelhagen, Michael Finke, Jie Yang, Alex...
This paper proposes an image-based modeling of clouds where realistic clouds are created from satellite images using metaballs. The intention of the paper is for applications to s...