Sciweavers

4307 search results - page 698 / 862
» Dynamic Spyware Analysis
Sort
View
DAC
2009
ACM
14 years 3 months ago
Throughput optimal task allocation under thermal constraints for multi-core processors
It is known that temperature gradients and thermal hotspots affect the reliability of microprocessors. Temperature is also an important constraint when maximizing the performance...
Vinay Hanumaiah, Ravishankar Rao, Sarma B. K. Vrud...
SAC
2009
ACM
14 years 3 months ago
A passive conformance testing approach for a MANET routing protocol
In this paper we propose a passive conformance testing technique applied to a Mobile ad hoc network (MANET) routing protocol, OLSR, that is characterized by a dynamically changing...
Ana R. Cavalli, Stéphane Maag, Edgardo Mont...
ICSE
2009
IEEE-ACM
14 years 3 months ago
Automatic creation of SQL Injection and cross-site scripting attacks
We present a technique for finding security vulnerabilities in Web applications. SQL Injection (SQLI) and crosssite scripting (XSS) attacks are widespread forms of attack in whic...
Adam Kiezun, Philip J. Guo, Karthick Jayaraman, Mi...
CEC
2009
IEEE
14 years 3 months ago
Coevolution of simulator proxies and sampling strategies for petroleum reservoir modeling
— Reservoir modeling is an on-going activity during the production life of a reservoir. One challenge to constructing accurate reservoir models is the time required to carry out ...
Tina Yu, Dave Wilkinson
GLOBECOM
2009
IEEE
14 years 3 months ago
An Auction-Based Incentive Mechanism for Non-Altruistic Cooperative ARQ via Spectrum-Leasing
— We propose and analyze a novel decentralized mechanism that motivates otherwise non-cooperative stations to participate as relays in cooperative ARQ protocol. Cooperation incen...
Igor Stanojev, Osvaldo Simeone, Umberto Spagnolini...