Sciweavers

1412 search results - page 162 / 283
» Experience Prototyping
Sort
View
NDSS
2008
IEEE
14 years 2 months ago
HookFinder: Identifying and Understanding Malware Hooking Behaviors
Installing various hooks into the victim system is an important attacking strategy employed by malware, including spyware, rootkits, stealth backdoors, and others. In order to def...
Heng Yin, Zhenkai Liang, Dawn Song
HICSS
2007
IEEE
123views Biometrics» more  HICSS 2007»
14 years 2 months ago
Dynamic Supply Chain Integration through Intelligent Agents
The success of supply chains depends on the match between the requirements and offerings that deliver the services. It can be ensured by separating requirements from the means of ...
Minhong Wang, Huaiqing Wang, Jiming Liu
CCGRID
2005
IEEE
14 years 1 months ago
Scaling NFSv4 with parallel file systems
Large grid installations require global access to massive data stores. Parallel file systems give high throughput within a LAN, but cross-site data transfers lack seamless integra...
Dean Hildebrand, Peter Honeyman
SPAA
2010
ACM
14 years 1 months ago
Simplifying concurrent algorithms by exploiting hardware transactional memory
We explore the potential of hardware transactional memory (HTM) to improve concurrent algorithms. We illustrate a number of use cases in which HTM enables significantly simpler c...
Dave Dice, Yossi Lev, Virendra J. Marathe, Mark Mo...
COMPSAC
1996
IEEE
14 years 14 days ago
Business Rule Extraction from Legacy Code
Business rules are operational rules that business organizationsfollow to peq%rm various activities. Over time, business rules evolve and the software that implemented them are al...
Hai Huang, Wei-Tek Tsai, Sourav Bhattacharya, Xiao...