Sciweavers

519 search results - page 80 / 104
» Control flow obfuscation with information flow tracking
Sort
View
CCS
2006
ACM
14 years 15 days ago
Packet vaccine: black-box exploit detection and signature generation
In biology, a vaccine is a weakened strain of a virus or bacterium that is intentionally injected into the body for the purpose of stimulating antibody production. Inspired by thi...
XiaoFeng Wang, Zhuowei Li, Jun Xu, Michael K. Reit...
CLADE
2004
IEEE
14 years 15 days ago
A Collaborative Informatics Infrastructure for Multi-scale Science
The Collaboratory for Multi-scale Chemical Science (CMCS) is developing a powerful informaticsbased approach to synthesizing multi-scale information to support a systems-based res...
James D. Myers, Thomas C. Allison, Sandra Bittner,...
CCR
2006
148views more  CCR 2006»
13 years 8 months ago
NetScale: scalable time-stepped hybrid simulation of large IP networks
This paper presents a scalable time-stepped hybrid simulation algorithm which is well adapted to the simulation of large IP networks (up to one million of competing flows and netw...
Laurent Fournié, Dohy Hong, Florent Perisse
JIRS
2008
165views more  JIRS 2008»
13 years 8 months ago
Visual Navigation for Mobile Robots: A Survey
Abstract Mobile robot vision-based navigation has been the source of countless research contributions, from the domains of both vision and control. Vision is becoming more and more...
Francisco Bonin-Font, Alberto Ortiz, Gabriel Olive...
ICWS
2010
IEEE
13 years 6 months ago
An Approach for Mining Web Service Composition Patterns from Execution Logs
A service-oriented application is composed of multiple web services to fulfill complex functionality that cannot be provided by individual web service. The combination of services ...
Ran Tang, Ying Zou