Sciweavers

988 search results - page 16 / 198
» Positive Results and Techniques for Obfuscation
Sort
View
WOWMOM
2009
ACM
124views Multimedia» more  WOWMOM 2009»
14 years 3 months ago
VAPS: Positioning with spatial constraints
The proliferation of mobile computing devices and local wireless networks has promoted a growing interest in location-aware systems. The problem with existing positioning techniqu...
Yesid Jarma, Golnaz Karbaschi, Marcelo Dias de Amo...
ICRA
2008
IEEE
129views Robotics» more  ICRA 2008»
14 years 3 months ago
Replanning with uncertainty in position: Sensor updates vs. prior map updates
— This paper presents two new approaches to planning with uncertainty in position that achieve better performance than existing techniques and that are able to incorporate change...
Juan Pablo Gonzalez, Anthony Stentz
TACAS
2012
Springer
275views Algorithms» more  TACAS 2012»
12 years 4 months ago
Pushdown Model Checking for Malware Detection
The number of malware is growing extraordinarily fast. Therefore, it is important to have efficient malware detectors. Malware writers try to obfuscate their code by different tec...
Fu Song, Tayssir Touili
NDSS
2009
IEEE
14 years 3 months ago
Coordinated Scan Detection
Coordinated attacks, where the tasks involved in an attack are distributed amongst multiple sources, can be used by an adversary to obfuscate his incursion. In this paper we prese...
Carrie Gates
BMCBI
2008
108views more  BMCBI 2008»
13 years 9 months ago
A nonparametric model for quality control of database search results in shotgun proteomics
Background: Analysis of complex samples with tandem mass spectrometry (MS/MS) has become routine in proteomic research. However, validation of database search results creates a bo...
Jiyang Zhang, Jianqi Li, Xin Liu, Hongwei Xie, Yun...