Sciweavers

1122 search results - page 174 / 225
» Behavioral Extensions of Institutions
Sort
View
INFOCOM
2010
IEEE
13 years 8 months ago
Malicious Shellcode Detection with Virtual Memory Snapshots
Abstract—Malicious shellcodes are segments of binary code disguised as normal input data. Such shellcodes can be injected into a target process’s virtual memory. They overwrite...
Boxuan Gu, Xiaole Bai, Zhimin Yang, Adam C. Champi...
INFOCOM
2010
IEEE
13 years 8 months ago
Recognizing Exponential Inter-Contact Time in VANETs
—Inter-contact time between moving vehicles is one of the key metrics in vehicular ad hoc networks (VANETs) and central to forwarding algorithms and the end-to-end delay. Due to ...
Hongzi Zhu, Luoyi Fu, Guangtao Xue, Yanmin Zhu, Mi...
ISPDC
2010
IEEE
13 years 8 months ago
Practical Uniform Peer Sampling under Churn
—Providing independent uniform samples from a system population poses considerable problems in highly dynamic settings, like P2P systems, where the number of participants and the...
Roberto Baldoni, Marco Platania, Leonardo Querzoni...
PERCOM
2010
ACM
13 years 8 months ago
Towards IEEE 802.15.4e: A study of performance aspects
—We discuss the applicability of IEEE 802.15.4 for application in industrial automation. Based on the specific requirements in this field, especially w.r.t. real-time operation...
Feng Chen, Reinhard German, Falko Dressler
TMC
2010
109views more  TMC 2010»
13 years 8 months ago
Uncertainty Modeling and Reduction in MANETs
—Evaluating and quantifying trust stimulates collaboration in mobile ad hoc networks (MANETs). Many existing reputation systems sharply divide the trust value into right or wrong...
Feng Li, Jie Wu