Sciweavers

988 search results - page 31 / 198
» Positive Results and Techniques for Obfuscation
Sort
View
FCCM
2004
IEEE
98views VLSI» more  FCCM 2004»
14 years 18 days ago
Automated Least-Significant Bit Datapath Optimization for FPGAs
In this paper we present a method for FPGA datapath precision optimization subject to user-defined area and error constraints. This work builds upon our previous research [1] which...
Mark L. Chang, Scott Hauck
SP
2010
IEEE
194views Security Privacy» more  SP 2010»
14 years 22 days ago
Identifying Dormant Functionality in Malware Programs
—To handle the growing flood of malware, security vendors and analysts rely on tools that automatically identify and analyze malicious code. Current systems for automated malwar...
Paolo Milani Comparetti, Guido Salvaneschi, Engin ...
IRI
2006
IEEE
14 years 2 months ago
A similarity based technique for detecting malicious executable files for computer forensics
With the rapidly increasing complexity of computer systems and the sophistication of hacking tools and techniques, there is a crucial need for computer forensic analysis technique...
Jun-Hyung Park, Minsoo Kim, BongNam Noh, James B. ...
ICASSP
2007
IEEE
14 years 3 months ago
A New Technique for High-Resolution Frequency Domain Optical Coherence Tomography
Frequency domain optical coherence tomography (FDOCT) is a new technique that is well-suited for fast imaging of biological specimens, as well as non-biological objects. The measu...
S. Chandra Sekhar, Himanshu Nazkani, Thierry Blu, ...
ICRA
2006
IEEE
134views Robotics» more  ICRA 2006»
14 years 2 months ago
EMG-based Teleoperation of a Robot Arm in Planar Catching Movements using ARMAX Model and Trajectory Monitoring Techniques
— This paper presents a methodology of teleoperating a robot arm, using electromyographic (EMG) signals and a trajectory monitoring technique based on human motion analysis. EMG ...
Panagiotis K. Artemiadis, Kostas J. Kyriakopoulos