Sciweavers

768 search results - page 152 / 154
» Data Movement in Kernelized Systems
Sort
View
CCS
2007
ACM
14 years 4 months ago
Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction
An alarming trend in malware attacks is that they are armed with stealthy techniques to detect, evade, and subvert malware detection facilities of the victim. On the defensive sid...
Xuxian Jiang, Xinyuan Wang, Dongyan Xu
CIKM
2006
Springer
14 years 1 months ago
Incorporating query difference for learning retrieval functions in world wide web search
We discuss information retrieval methods that aim at serving a diverse stream of user queries such as those submitted to commercial search engines. We propose methods that emphasi...
Hongyuan Zha, Zhaohui Zheng, Haoying Fu, Gordon Su...
ARTMED
2004
118views more  ARTMED 2004»
13 years 9 months ago
Bayesian fluorescence in situ hybridisation signal classification
Previous research has indicated the significance of accurate classification of fluorescence in situ hybridisation (FISH) signals for the detection of genetic abnormalities. Based ...
Boaz Lerner
CLUSTER
1999
IEEE
13 years 9 months ago
The Network RamDisk: Using remote memory on heterogeneous NOWs
Efficient data storage, a major concern in the modern computer industry, is mostly provided today by the the traditional magnetic disk. Unfortunately the cost of a disk transfer m...
Michail Flouris, Evangelos P. Markatos
CCS
2005
ACM
14 years 3 months ago
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits
Vulnerabilities that allow worms to hijack the control flow of each host that they spread to are typically discovered months before the worm outbreak, but are also typically disc...
Jedidiah R. Crandall, Zhendong Su, Shyhtsun Felix ...