Sciweavers

8177 search results - page 102 / 1636
» Detecting System Emulators
Sort
View
CLEF
2010
Springer
13 years 11 months ago
Exploring Fingerprinting as External Plagiarism Detection Method - Lab Report for PAN at CLEF 2010
This paper outlines the main approach and the general design of the plagiarism detection prototype application we have developed to take part in the 2nd International Plagiarism De...
Yurii Palkovskii, Alexei Belov, Irina Muzika
HOTOS
1997
IEEE
14 years 2 months ago
The Role of Trace Modulation in Building Mobile Computing Systems
ty of accurately re-creating a mobile networkingAbstract environment in vitro argues for live experiments. On the In this paper we put forth the view that trace other hand, the dif...
Mahadev Satyanarayanan, Brian Noble
ACNS
2009
Springer
157views Cryptology» more  ACNS 2009»
14 years 4 months ago
Malyzer: Defeating Anti-detection for Application-Level Malware Analysis
Abstract. Malware analysis is critical for malware detection and prevention. To defeat malware analysis and detection, today malware commonly adopts various sophisticated anti-dete...
Lei Liu, Songqing Chen
RTAS
2006
IEEE
14 years 4 months ago
Memory Footprint Reduction with Quasi-Static Shared Libraries in MMU-less Embedded Systems
Despite a rapid decrease in the price of solid state memory devices, system memory is still a very precious resource in embedded systems. The use of shared libraries is known to b...
Jaesoo Lee, Jiyong Park, Seongsoo Hong
MOBISYS
2009
ACM
14 years 10 months ago
BlueMonarch: a system for evaluating bluetooth applications in the wild
Despite Bluetooth's popularity, low cost, and low power requirements, Bluetooth applications remain remarkably unsophisticated. Although the research community and industry h...
Timothy J. Smith, Stefan Saroiu, Alec Wolman