Sciweavers

191 search results - page 4 / 39
» Automated Spyware Collection and Analysis
Sort
View
IPPS
2005
IEEE
14 years 1 months ago
Automated Analysis of Memory Access Behavior
Abstract— We developed an automated environment to measure the memory access behavior of applications on high performance clusters. Code optimization for processor caches is cruc...
Michael Gerndt, Tianchao Li
DATE
2009
IEEE
115views Hardware» more  DATE 2009»
14 years 2 months ago
Automated data analysis solutions to silicon debug
Since pre-silicon functional verification is insufficient to detect all design errors, re-spins are often needed due to malfunctions that escape into the silicon. This paper pre...
Yu-Shen Yang, Nicola Nicolici, Andreas G. Veneris
DEON
2004
Springer
14 years 26 days ago
Collective Obligations and Agents: Who Gets the Blame?
This work addresses the issue of obligations directed to groups of agents. Our main concern consists in providing a formal analysis of the structure connecting collective obligatio...
Davide Grossi, Frank Dignum, Lambèr M. M. R...
CCS
2009
ACM
14 years 8 months ago
Automating analysis of large-scale botnet probing events
Botnets dominate today's attack landscape. In this work we investigate ways to analyze collections of malicious probing traffic in order to understand the significance of lar...
Zhichun Li, Anup Goyal, Yan Chen, Vern Paxson
GIS
2009
ACM
14 years 2 months ago
Proximate sensing using georeferenced community contributed photo collections
Volunteered geographic information such as that available in blogs, wikis, social networking sites, and community contributed photo collections is enabling new applications. This ...
Daniel Leung, Shawn Newsam