Sciweavers

6284 search results - page 1181 / 1257
» An evaluation of Bradfordizing effects
Sort
View
USENIX
2007
13 years 11 months ago
Dynamic Spyware Analysis
Spyware is a class of malicious code that is surreptitiously installed on victims’ machines. Once active, it silently monitors the behavior of users, records their web surfing ...
Manuel Egele, Christopher Kruegel, Engin Kirda, He...
NSDI
2008
13 years 11 months ago
BFT Protocols Under Fire
Much recent work on Byzantine state machine replication focuses on protocols with improved performance under benign conditions (LANs, homogeneous replicas, limited crash faults), ...
Atul Singh, Tathagata Das, Petros Maniatis, Peter ...
USS
2008
13 years 11 months ago
CloudAV: N-Version Antivirus in the Network Cloud
Antivirus software is one of the most widely used tools for detecting and stopping malicious and unwanted files. However, the long term effectiveness of traditional hostbased anti...
Jon Oberheide, Evan Cooke, Farnam Jahanian
ACMACE
2008
ACM
13 years 11 months ago
When RFIDs meet artist's painting
This work challenges the conventional art experience. It brings together the fields of art, science, and software integration. The goal was to create a new kind of painting based ...
Olivier Haberman, Romain Pellerin, Ugo Haberman
ACMSE
2008
ACM
13 years 11 months ago
Optimization of the multiple retailer supply chain management problem
With stock surpluses and shortages representing one of the greatest elements of risk to wholesalers, a solution to the multiretailer supply chain management problem would result i...
Caio Soares, Gerry V. Dozier, Emmett Lodree, Jared...
« Prev « First page 1181 / 1257 Last » Next »