Sciweavers

4307 search results - page 788 / 862
» Dynamic Spyware Analysis
Sort
View
MOBIHOC
2002
ACM
14 years 8 months ago
Comparison of broadcasting techniques for mobile ad hoc networks
Network wide broadcasting in Mobile Ad Hoc Networks provides important control and route establishment functionality for a number of unicast and multicast protocols. Considering i...
Brad Williams, Tracy Camp
ESORICS
2009
Springer
14 years 3 months ago
Privacy Preserving Publication of Moving Object Data
The increasing availability of space-time trajectories left by location-aware devices is expected to enable novel classes of applications where the discovery of consumable, concise...
Francesco Bonchi
NDSS
2009
IEEE
14 years 3 months ago
Scalable, Behavior-Based Malware Clustering
Anti-malware companies receive thousands of malware samples every day. To process this large quantity, a number of automated analysis tools were developed. These tools execute a m...
Ulrich Bayer, Paolo Milani Comparetti, Clemens Hla...
ICIAR
2009
Springer
14 years 3 months ago
Image and Video Retargetting by Darting
This paper considers the problem of altering an image by imperceptibly adding or removing pixels, for example, to fit a differently shaped frame with minimal loss of interesting ...
Matthew Brand
GLOBECOM
2008
IEEE
14 years 3 months ago
Distributed Spectrum Allocation of Delay-Sensitive Users over Multi-User Multi-Carrier Networks
—In this paper, we study the distributed spectrum allocation for autonomous users transmitting delay-sensitive information over a wireless multi-carrier network. Because there is...
Wenchi Tu, Mihaela van der Schaar