Sciweavers

1008 search results - page 192 / 202
» An Infrastructure for Development of Dynamically Adaptable D...
Sort
View
GECCO
2009
Springer
138views Optimization» more  GECCO 2009»
14 years 1 months ago
IMAD: in-execution malware analysis and detection
The sophistication of computer malware is becoming a serious threat to the information technology infrastructure, which is the backbone of modern e-commerce systems. We, therefore...
Syed Bilal Mehdi, Ajay Kumar Tanwani, Muddassar Fa...
ICNP
2007
IEEE
14 years 1 months ago
Inferring the Origin of Routing Changes using Link Weights
— The global Internet routing infrastructure is a large and complex distributed system where routing changes occur constantly. Our objective in this paper is to develop a simple ...
Mohit Lad, Ricardo V. Oliveira, Daniel Massey, Lix...
BMCBI
2007
146views more  BMCBI 2007»
13 years 7 months ago
Towards Semantic e-Science for Traditional Chinese Medicine
Background: Recent advances in Web and information technologies with the increasing decentralization of organizational structures have resulted in massive amounts of information r...
Huajun Chen, Yuxin Mao, Xiaoqing Zheng, Meng Cui, ...
RAID
2010
Springer
13 years 5 months ago
An Analysis of Rogue AV Campaigns
Abstract. Rogue antivirus software has recently received extensive attention, justified by the diffusion and efficacy of its propagation. We present a longitudinal analysis of th...
Marco Cova, Corrado Leita, Olivier Thonnard, Angel...
CODES
2010
IEEE
13 years 4 months ago
Hardware/software optimization of error detection implementation for real-time embedded systems
This paper presents an approach to system-level optimization of error detection implementation in the context of fault-tolerant realtime distributed embedded systems used for safe...
Adrian Lifa, Petru Eles, Zebo Peng, Viacheslav Izo...