Sciweavers

8621 search results - page 1664 / 1725
» Interaction Design
Sort
View
ACSC
2006
IEEE
14 years 3 months ago
SPiKE: engineering malware analysis tools using unobtrusive binary-instrumentation
Malware — a generic term that encompasses viruses, trojans, spywares and other intrusive code — is widespread today. Malware analysis is a multi-step process providing insight...
Amit Vasudevan, Ramesh Yerraballi
ASWEC
2006
IEEE
14 years 3 months ago
Preventing SQL Injection Attacks in Stored Procedures
An SQL injection attack targets interactive web applications that employ database services. These applications accept user inputs and use them to form SQL statements at runtime. D...
Ke Wei, Muthusrinivasan Muthuprasanna, Suraj Kotha...
AUIC
2006
IEEE
14 years 3 months ago
Patternprogrammer: yet another rule-based programming environment for children
Graphical rewrite rules are often used in programming environments for children. These rules consist of two parts: a left-hand side, which is visually matched in the environment, ...
Tim Wright
INFOCOM
2006
IEEE
14 years 3 months ago
Mobile Emulab: A Robotic Wireless and Sensor Network Testbed
Abstract— Simulation has been the dominant research methodology in wireless and sensor networking. When mobility is added, real-world experimentation is especially rare. However,...
David Johnson, Tim Stack, Russ Fish, Daniel Montra...
IROS
2006
IEEE
165views Robotics» more  IROS 2006»
14 years 3 months ago
Grounded Situation Models for Robots: Where words and percepts meet
— Our long-term objective is to develop robots that engage in natural language-mediated cooperative tasks with humans. To support this goal, we are developing an amodal represent...
Nikolaos Mavridis, Deb Roy
« Prev « First page 1664 / 1725 Last » Next »