Sciweavers

191 search results - page 16 / 39
» Local bifurcations of the Chen System
Sort
View
NDSS
2005
IEEE
14 years 1 months ago
A Black-Box Tracing Technique to Identify Causes of Least-Privilege Incompatibilities
Most Windows users run all the time with Admin privileges. This significantly increases the vulnerability of Windows systems because the compromise of any user-level application ...
Shuo Chen, John Dunagan, Chad Verbowski, Yi-Min Wa...
ICRA
2003
IEEE
122views Robotics» more  ICRA 2003»
14 years 29 days ago
Motion planning for humanoid walking in a layered environment
- Motion planning is one of the key capabilities for autonomous humanoid robots. Previous researches have focused on weight balancing, collision detection, and gait generation. Mos...
Tsai-Yen Li, Pei-Feng Chen, Pei-Zhi Huang
ARC
2008
Springer
112views Hardware» more  ARC 2008»
13 years 9 months ago
Lossless Compression for Space Imagery in a Dynamically Reconfigurable Architecture
Abstract. This paper presents a novel dynamically reconfigurable hardware architecture for lossless compression and its optimization for space imagery. The proposed system makes us...
Xiaolin Chen, Cedric Nishan Canagarajah, Raffaele ...
ICPR
2002
IEEE
14 years 19 days ago
A Robust Approach for Recognition of Text Embedded in Natural Scenes
In this paper, we propose a robust approach for recognition of text embedded in natural scenes. Instead of using binary information as most other OCR systems do, we extract featur...
Jing Zhang, Xilin Chen, Andreas Hanneman, Jie Yang...
NDSS
2005
IEEE
14 years 1 months ago
Enriching Intrusion Alerts Through Multi-Host Causality
Current intrusion detection systems point out suspicious states or events but do not show how the suspicious state or events relate to other states or events in the system. We sho...
Samuel T. King, Zhuoqing Morley Mao, Dominic G. Lu...