Sciweavers

3618 search results - page 636 / 724
» Additive functions for number systems in function fields
Sort
View
BWCCA
2010
13 years 3 months ago
Fast Deployment of Computer Forensics with USBs
As popularity of the Internet continues to grow, it changes the way of computer crime. Number of computer crime increases dramatically in recent years and investigators have been f...
Chung-Huang Yang, Pei-Hua Yen
ICASSP
2011
IEEE
13 years 21 days ago
Gear scale estimation for synthetic speed pulse generation
In a motorized vehicle a number of easily measurable signals with frequency components related to the rotational speed of the engine can be found, e.g., vibrations, electrical sys...
John-Olof Nilsson, Isaac Skog, Alessio De Angelis,...
CSE
2009
IEEE
14 years 3 months ago
Implementing Social Norms Using Policies
—Multi-agent systems are difficult to develop. One reason for this is that agents are embedded in a society where all agents must agree to obey certain social norms in order for...
Robert Kremer
MICRO
2008
IEEE
124views Hardware» more  MICRO 2008»
14 years 3 months ago
SHARK: Architectural support for autonomic protection against stealth by rootkit exploits
Rootkits have become a growing concern in cyber-security. Typically, they exploit kernel vulnerabilities to gain root privileges of a system and conceal malware’s activities fro...
Vikas R. Vasisht, Hsien-Hsin S. Lee
HPDC
2006
IEEE
14 years 3 months ago
WOW: Self-Organizing Wide Area Overlay Networks of Virtual Workstations
— This paper describes WOW, a distributed system that combines virtual machine, overlay networking and peerto-peer techniques to create scalable wide-area networks of virtual wor...
Arijit Ganguly, Abhishek Agrawal, P. Oscar Boykin,...