Sciweavers

2236 search results - page 277 / 448
» Intrusion detection techniques and approaches
Sort
View
ICRA
2009
IEEE
152views Robotics» more  ICRA 2009»
14 years 5 months ago
Integration of active and passive compliance control for safe human-robot coexistence
— In this paper we discuss the integration of active and passive approaches to robotic safety in an overall scheme for real-time manipulator control. The active control approach ...
Riccardo Schiavi, Antonio Bicchi, Fabrizio Flacco
CVPR
2008
IEEE
15 years 23 days ago
Real-time pose estimation of articulated objects using low-level motion
We present a method that is capable of tracking and estimating pose of articulated objects in real-time. This is achieved by using a bottom-up approach to detect instances of the ...
Ben Daubney, David P. Gibson, Neill W. Campbell
IWSEC
2009
Springer
14 years 5 months ago
Tamper-Tolerant Software: Modeling and Implementation
Abstract. Common software-protection systems attempt to detect malicious observation and modification of protected applications. Upon tamper detection, anti-hacking code may produ...
Mariusz H. Jakubowski, Chit Wei Saw, Ramarathnam V...
KBSE
2005
IEEE
14 years 4 months ago
AMNESIA: analysis and monitoring for NEutralizing SQL-injection attacks
The use of web applications has become increasingly popular in our routine activities, such as reading the news, paying bills, and shopping on-line. As the availability of these s...
William G. J. Halfond, Alessandro Orso
ICSM
2005
IEEE
14 years 4 months ago
Test Suite Reduction with Selective Redundancy
Software testing is a critical part of software development. Test suite sizes may grow significantly with subsequent modifications to the software over time. Due to time and res...
Dennis Jeffrey, Neelam Gupta