Sciweavers

698 search results - page 81 / 140
» Evaluating Key Statements Analysis
Sort
View
SP
2010
IEEE
140views Security Privacy» more  SP 2010»
14 years 1 months ago
Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries
Abstract—Unfortunately, malicious software is still an unsolved problem and a major threat on the Internet. An important component in the fight against malicious software is the...
Clemens Kolbitsch, Thorsten Holz, Christopher Krue...
ERSA
2008
93views Hardware» more  ERSA 2008»
13 years 11 months ago
Multiparadigm Computing for Space-Based Synthetic Aperture Radar
Projected computational requirements for future space missions are outpacing technologies and trends in conventional embedded microprocessors. In order to meet the necessary levels...
Adam Jacobs, Grzegorz Cieslewski, Casey Reardon, A...
HCI
2007
13 years 11 months ago
Designing "Culture" into Modern Product: A Case Study of Cultural Product Design
“Culture” plays an important role in the design field, and “cross cultural design” will be a key design evaluation point in the future. Designing “culture” into modern ...
Rungtai Lin, Ming-Xian Sun, Ya-Ping Chang, Yu-Chin...
IPM
2000
96views more  IPM 2000»
13 years 9 months ago
Further reflections on TREC
The paper reviews the TREC Programme up to TREC-6 (1997), considering the test results, the substantive findings for IR that follow, and the lessons TREC offers for IR evaluation....
Karen Sparck Jones
INFOCOM
2012
IEEE
12 years 12 days ago
VDN: Virtual machine image distribution network for cloud data centers
—Cloud computing centers face the key challenge of provisioning diverse virtual machine instances in an elastic and scalable manner. To address this challenge, we have performed ...
Chunyi Peng, Minkyong Kim, Zhe Zhang, Hui Lei