Sciweavers

988 search results - page 151 / 198
» Positive Results and Techniques for Obfuscation
Sort
View
ATAL
2010
Springer
13 years 10 months ago
Developing high-level cognitive functions for service robots
The primary target of this work is human-robot collaboration, especially for service robots in complicated application scenarios. Three assumptions and four requirements are ident...
Xiaoping Chen, Jianmin Ji, Jiehui Jiang, Guoqiang ...
DIMVA
2009
13 years 10 months ago
Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks
Drive-by download attacks are among the most common methods for spreading malware today. These attacks typically exploit memory corruption vulnerabilities in web browsers and brows...
Manuel Egele, Peter Wurzinger, Christopher Kruegel...
CORR
2010
Springer
94views Education» more  CORR 2010»
13 years 9 months ago
Discovery of Convoys in Trajectory Databases
As mobile devices with positioning capabilities continue to proliferate, data management for so-called trajectory databases that capture the historical movements of populations of...
Hoyoung Jeung, Man Lung Yiu, Xiaofang Zhou, Christ...
CORR
2006
Springer
86views Education» more  CORR 2006»
13 years 9 months ago
Maximum Entropy MIMO Wireless Channel Models
In this contribution, models of wireless channels are derived from the maximum entropy principle, for several cases where only limited information about the propagation environmen...
Maxime Guillaud, Mérouane Debbah, Aris L. M...
CORR
2007
Springer
117views Education» more  CORR 2007»
13 years 9 months ago
Sensor Networks with Random Links: Topology Design for Distributed Consensus
—In a sensor network, in practice, the communication among sensors is subject to: 1) errors that can cause failures of links among sensors at random times; 2) costs; and 3) const...
Soummya Kar, José M. F. Moura