Sciweavers

4502 search results - page 810 / 901
» Regular Model Checking
Sort
View
WORM
2003
13 years 11 months ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...
VCIP
2000
148views Communications» more  VCIP 2000»
13 years 11 months ago
Aircraft recognition and pose estimation
This work presents a geometry based vision system for aircraft recognition and pose estimation using single images. Pose estimation improves the tracking performance of guided wea...
Hatem Hmam, Jijoong Kim
IJCAI
1993
13 years 11 months ago
Perception and Experience in Problem Solving
Whilst much emphasis in AI has been placed on the use of goals in problem solving, less emphasis has been placed on the role of perception and experience. In this paper we show th...
Edmund Furse, Rod Nicolson
CORR
2010
Springer
112views Education» more  CORR 2010»
13 years 10 months ago
Efficient Approximation of Optimal Control for Markov Games
The success of probabilistic model checking for discrete-time Markov decision processes and continuous-time Markov chains has led to rich academic and industrial applications. The ...
Markus Rabe, Sven Schewe, Lijun Zhang
ENTCS
2008
101views more  ENTCS 2008»
13 years 10 months ago
Improving Fault-based Conformance Testing
Fault-based conformance testing is a conformance testing strategy that relies on specific fault models. Previously, this mutation testing technique has been applied to protocol spe...
Bernhard K. Aichernig, Martin Weiglhofer, Franz Wo...