Sciweavers

880 search results - page 124 / 176
» Model checking erlang programs: the functional approach
Sort
View
137
Voted
ACSAC
2006
IEEE
15 years 10 months ago
PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware
Modern malware often hide the malicious portion of their program code by making it appear as data at compiletime and transforming it back into executable code at runtime. This obf...
Paul Royal, Mitch Halpin, David Dagon, Robert Edmo...
VLC
2002
118views more  VLC 2002»
15 years 3 months ago
Modeling Behaviors of Interactive Objects for Real-Time Virtual Environments
Real-time 3D graphics are being extensively used to build interactive virtual environments for a number of different applications. In many situations, virtual objects are required...
Marcelo Kallmann, Daniel Thalmann
ICRA
2008
IEEE
145views Robotics» more  ICRA 2008»
15 years 10 months ago
Acquiring change models for sensor-based robot manipulation
—The aim of this paper is to enable a programmer to easily employ external sensors for flexible robot manipulation. We describe a general approach to determine the relation betwe...
Jan Deiterding, Dominik Henrich
135
Voted
ICSE
2008
IEEE-ACM
16 years 4 months ago
An ontology-driven software architecture evaluation method
Software architecture evaluation has a crucial role in the life cycle of software intensive systems. In this paper we propose an approach to empower a software architecture evalua...
Aida Erfanian, Fereidoun Shams Aliee
CG
2004
Springer
15 years 9 months ago
Searching over Metapositions in Kriegspiel
Kriegspiel is a Chess variant similar to wargames, in which players have to deal with uncertainty. Kriegspiel increases the difficulty typical of Chess by hiding from each player h...
Andrea Bolognesi, Paolo Ciancarini