Sciweavers

200 search results - page 19 / 40
» Analyzing the Working Set Characteristics of Branch Executio...
Sort
View
DSN
2008
IEEE
14 years 2 months ago
AGIS: Towards automatic generation of infection signatures
An important yet largely uncharted problem in malware defense is how to automate generation of infection signatures for detecting compromised systems, i.e., signatures that charac...
Zhuowei Li, XiaoFeng Wang, Zhenkai Liang, Michael ...
ISSTA
2009
ACM
14 years 2 months ago
AVA: automated interpretation of dynamically detected anomalies
Dynamic analysis techniques have been extensively adopted to discover causes of observed failures. In particular, anomaly detection techniques can infer behavioral models from obs...
Anton Babenko, Leonardo Mariani, Fabrizio Pastore
FIMH
2005
Springer
14 years 1 months ago
Supporting the TECAB Grafting Through CT Based Analysis of Coronary Arteries
Calcified coronary arteries can cause severe cardiac problems and may provoke an infarction of the heart’s wall. An established treatment method is the bypass operation. The usa...
Stefan Wesarg
ISQED
2003
IEEE
119views Hardware» more  ISQED 2003»
14 years 1 months ago
System and Framework for QA of Process Design Kits
In this paper, we evaluate the dependencies between tools, data and environment in process design kits, and present a framework for systematically analyzing the quality of the des...
M. C. Scott, M. O. Peralta, Jo Dale Carothers
ACNS
2004
Springer
156views Cryptology» more  ACNS 2004»
14 years 1 months ago
One-Round Protocols for Two-Party Authenticated Key Exchange
Cryptographic protocol design in a two-party setting has often ignored the possibility of simultaneous message transmission by each of the two parties (i.e., using a duplex channe...
Ik Rae Jeong, Jonathan Katz, Dong Hoon Lee