Sciweavers

212 search results - page 32 / 43
» Dynamic Logic with Non-rigid Functions
Sort
View
WCRE
2010
IEEE
13 years 6 months ago
Reverse Engineering Self-Modifying Code: Unpacker Extraction
—An important application of binary-level reverse engineering is in reconstructing the internal logic of computer malware. Most malware code is distributed in encrypted (or “pa...
Saumya K. Debray, Jay Patel
VLDB
2007
ACM
135views Database» more  VLDB 2007»
14 years 1 months ago
Self-Organizing Schema Mappings in the GridVine Peer Data Management System
GridVine is a Peer Data Management System based on a decentralized access structure. Built following the principle of data independence, it separates a logical layer – where dat...
Philippe Cudré-Mauroux, Suchit Agarwal, Adr...
HICSS
2002
IEEE
169views Biometrics» more  HICSS 2002»
14 years 22 days ago
Enabling Technology for Personalizing Mobile Services
A major trend in the current information society is personalization, which is considered a key business enabler for mobile services because the mobile device is a personal assista...
Marc M. Lankhorst, Herma Van Kranenburg, Alfons H....
MASCOTS
2001
13 years 9 months ago
Large-Scale Simulation of Replica Placement Algorithms for a Serverless Distributed File System
Farsite is a scalable, distributed file system that logically functions as a centralized file server but that is physically implemented on a set of client desktop computers. Farsi...
John R. Douceur, Roger Wattenhofer
IAJIT
2007
146views more  IAJIT 2007»
13 years 7 months ago
Adaptive Optimizing of Hello Messages in Wireless Ad-Hoc Networks
: Routing is an important functional aspect in wireless ad-hoc networks that handles discovering and maintaining the paths between nodes within a network. Due to nodes mobility, th...
Essam Natsheh, Adznan B. Jantan, Sabira Khatun, Su...