Sciweavers

12697 search results - page 23 / 2540
» Call for Papers
Sort
View
RAID
2007
Springer
14 years 1 months ago
Exploiting Execution Context for the Detection of Anomalous System Calls
Attacks against privileged applications can be detected by analyzing the stream of system calls issued during process execution. In the last few years, several approaches have been...
Darren Mutz, William K. Robertson, Giovanni Vigna,...
AINA
2007
IEEE
14 years 2 months ago
A Location-Aware Mobile Call Handling Assistant
With the near ubiquity of mobile phones, people are reachable almost anywhere and at any time. At the same time we see an increasing need for people to limit their interactions on...
Ibrahim Bokharouss, Wayne Wobcke, Yiu-Wa Chan, And...
ICFEM
2010
Springer
13 years 6 months ago
Verifying Heap-Manipulating Programs with Unknown Procedure Calls
Abstract. Verification of programs with invocations to unknown procedures is a practical problem, because in many scenarios not all codes of programs to be verified are available...
Shengchao Qin, Chenguang Luo, Guanhua He, Florin C...
TC
2002
13 years 7 months ago
Distributed Call Admission Control for a Heterogeneous PCS Network
Abstract--Personal communication service (PCS) networks offer mobile users multimedia applications with different quality-ofservice (QoS) and bandwidth requirements. This paper pro...
Yieh-Ran Haung, Jan-Ming Ho
JSW
2006
124views more  JSW 2006»
13 years 7 months ago
Dynamic Web Service Calls for Data Integration
Web Services are considered as a dominant paradigm for constructing and composing distributed business application and enabling enterprise-wide interoperability. A peer to peer arc...
Salima Benbernou, Mohand-Said Hacid