Sciweavers

4233 search results - page 662 / 847
» Three Paths to Effectiveness
Sort
View
VIROLOGY
2008
121views more  VIROLOGY 2008»
15 years 4 months ago
Constructing malware normalizers using term rewriting
A malware mutation engine is able to transform a malicious program to create a different version of the program. Such mutation engines are used at distribution sites or in self-pro...
Andrew Walenstein, Rachit Mathur, Mohamed R. Chouc...
VLC
2008
132views more  VLC 2008»
15 years 4 months ago
Enforced generative patterns for the specification of the syntax and semantics of visual languages
We present the new notion of enforced generative pattern, a structure that declares positive or negative conditions that must be satisfied by a model. Patterns are applied to tran...
Paolo Bottoni, Esther Guerra, Juan de Lara
AUTOMATICA
2002
124views more  AUTOMATICA 2002»
15 years 4 months ago
Stabilizing underwater vehicle motion using internal rotors
As a case study of a particular control methodology and as a practical contribution in the area of underwater vehicle control, we consider the problem of stabilizing an underwater...
Craig A. Woolsey, Naomi Ehrich Leonard
CERA
2004
95views more  CERA 2004»
15 years 4 months ago
A New Design for Production (DFP) Methodology with Two Case Studies
Concurrent engineering (CE) design demands the consideration of product life-cycle issues in the early product design stage. Among various life-cycle issues, this work concentrate...
Lee Ming Wong, G. Gary Wang, Doug Strong
CONCURRENCY
2004
151views more  CONCURRENCY 2004»
15 years 4 months ago
User transparency: a fully sequential programming model for efficient data parallel image processing
Although many image processing applications are ideally suited for parallel implementation, most researchers in imaging do not benefit from high performance computing on a daily b...
Frank J. Seinstra, Dennis Koelma