Sciweavers

988 search results - page 24 / 198
» Positive Results and Techniques for Obfuscation
Sort
View
CCS
2007
ACM
14 years 25 days ago
Analyzing network traffic to detect self-decrypting exploit code
Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are...
Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Pu...
ICRA
1998
IEEE
166views Robotics» more  ICRA 1998»
14 years 1 months ago
Learning Techniques in a Dataglove Based Telemanipulation System for the DLR Hand
We present a setup to control a four- nger anthropomorphic robot hand using a dataglove. To be able to accurately use the dataglove we implemented a nonlinear learning calibration...
Max Fischer, P. Patrick van der Smagt, Gerd Hirzin...
ICIP
2001
IEEE
14 years 10 months ago
Improving a genetic algorithm segmentation by means of a fast edge detection technique
Thispaper presents a new hybrid range image segmentation approach. Two separate techniques are applied consecutively. First, iin edge based segmentation technique extracts the edg...
Angel Domingo Sappa, Vitoantonio Bevilacqua, Miche...
ASIAMS
2008
IEEE
14 years 3 months ago
Vibration Suppression Techniques in Feedback Control of a Very Flexible Robot Manipulator
This paper presents the use of angular position control approaches for a flexible robot manipulator with disturbances effect in the dynamic system. Delayed Feedback Signal (DFS) a...
Mohd Ashraf Ahmad, Zaharuddin Mohamed, Haszuraidah...
TEC
2002
89views more  TEC 2002»
13 years 8 months ago
An immunity-based technique to characterize intrusions in computer networks
Abstract--This paper presents a technique inspired by the negative selection mechanism of the immune system that can detect foreign patterns in the complement (nonself) space. In p...
Fabio A. González, Dipankar Dasgupta