Sciweavers

4307 search results - page 703 / 862
» Dynamic Spyware Analysis
Sort
View
ACSAC
2008
IEEE
14 years 3 months ago
Soft-Timer Driven Transient Kernel Control Flow Attacks and Defense
A new class of stealthy kernel-level malware, called transient kernel control flow attacks, uses dynamic soft timers to achieve significant work while avoiding any persistent ch...
Jinpeng Wei, Bryan D. Payne, Jonathon Giffin, Calt...
ACSAC
2008
IEEE
14 years 3 months ago
OMOS: A Framework for Secure Communication in Mashup Applications
Mashups are new Web 2.0 applications that seamlessly combine contents from multiple heterogeneous data sources into one integrated browser environment. The hallmark of these appli...
Saman Zarandioon, Danfeng Yao, Vinod Ganapathy
AINA
2008
IEEE
14 years 3 months ago
Live Network Performance Challenge: FLASH-OFDM vs. HSDPA
HSDPA networks are intensively being deployed to provide mobile broadband connectivity to mobile devices. In addition to HSDPA, FLASH-OFDM is another wireless broadband option ope...
Andres Arjona, Antti Ylä-Jääski, Ju...
CCGRID
2008
IEEE
14 years 3 months ago
Adaptive Hybrid Model for Long Term Load Prediction in Computational Grid
Long term load prediction can assist task scheduling and load balancing greatly in distributed environment such as computational grid. Due to the dynamic property of grid environm...
Yulai Yuan, Yongwei Wu, Guangwen Yang, Weimin Zhen...
CDC
2008
IEEE
103views Control Systems» more  CDC 2008»
14 years 3 months ago
Symbolic models for nonlinear control systems affected by disturbances
Abstract— Symbolic models are abstract descriptions of continuous systems in which symbols represent aggregates of continuous states. In the last few years there has been a growi...
Giordano Pola, Paulo Tabuada