Sciweavers

61 search results - page 6 / 13
» Authentic Intervention in Information Systems Practice
Sort
View
WORM
2003
13 years 8 months ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...
EUROSYS
2006
ACM
14 years 4 months ago
Automated known problem diagnosis with event traces
Computer problem diagnosis remains a serious challenge to users and support professionals. Traditional troubleshooting methods relying heavily on human intervention make the proce...
Chun Yuan, Ni Lao, Ji-Rong Wen, Jiwei Li, Zheng Zh...
FC
2005
Springer
99views Cryptology» more  FC 2005»
14 years 1 months ago
Countering Identity Theft Through Digital Uniqueness, Location Cross-Checking, and Funneling
One of today’s fastest growing crimes is identity theft – the unauthorized use and exploitation of another individual’s identitycorroborating information. It is exacerbated b...
Paul C. van Oorschot, Stuart G. Stubblebine
ETFA
2006
IEEE
14 years 1 months ago
Fault Tolerance for Manufacturing Components
The more the information technologies begin to be incorporated into the industrial productive fabric, the more complex it becomes to organise them. It is vital to implant proactiv...
Diego Marcos-Jorquera, Francisco Maciá P&ea...
CHI
2009
ACM
14 years 8 months ago
A vehicle for research: using street sweepers to explore the landscape of environmental community action
Researchers are developing mobile sensing platforms to facilitate public awareness of environmental conditions. However, turning such awareness into practical community action and...
Paul M. Aoki, R. J. Honicky, Alan M. Mainwaring, C...