Sciweavers

3396 search results - page 618 / 680
» Tree representations of graphs
Sort
View
SP
2009
IEEE
262views Security Privacy» more  SP 2009»
14 years 5 months ago
Automatic Reverse Engineering of Malware Emulators
Malware authors have recently begun using emulation technology to obfuscate their code. They convert native malware binaries into bytecode programs written in a randomly generated...
Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffi...
SASO
2009
IEEE
14 years 5 months ago
Swarming Polyagents Executing Hierarchical Task Networks
Swarming agents often operate in benign geographic topologies that let them explore alternative trajectories with minor variations that the agent dynamics then amplify for improve...
Sven A. Brueckner, Theodore C. Belding, Robert Bis...
LICS
2009
IEEE
14 years 5 months ago
On the Computational Complexity of Verifying One-Counter Processes
—One-counter processes are pushdown systems over a singleton stack alphabet (plus a stack-bottom symbol). We study the complexity of two closely related verification problems ov...
Stefan Göller, Richard Mayr, Anthony Widjaja ...
DAGM
2009
Springer
14 years 5 months ago
Self-Organizing Maps for Pose Estimation with a Time-of-Flight Camera
We describe a technique for estimating human pose from an image sequence captured by a time-of-flight camera. The pose estimation is derived from a simple model of the human body ...
Martin Haker, Martin Böhme, Thomas Martinetz,...
HT
2009
ACM
14 years 5 months ago
Contextualising tags in collaborative tagging systems
Collaborative tagging systems are now popular tools for organising and sharing information on the Web. While collaborative tagging offers many advantages over the use of controll...
Ching-man Au Yeung, Nicholas Gibbins, Nigel Shadbo...