Sciweavers

770 search results - page 145 / 154
» Experience in e-Science Requirements Engineering
Sort
View
ACSAC
2007
IEEE
14 years 1 months ago
HoneyIM: Fast Detection and Suppression of Instant Messaging Malware in Enterprise-Like Networks
Instant messaging (IM) has been one of most frequently used malware attack vectors due to its popularity. Distinct from other malware, it is straightforward for IM malware to fin...
Mengjun Xie, Zhenyu Wu, Haining Wang
COMSWARE
2007
IEEE
14 years 1 months ago
OASiS: A Programming Framework for Service-Oriented Sensor Networks
Abstract— Wireless sensor networks consist of small, inexpensive devices which interact with the environment, communicate with each other, and perform distributed computations in...
Manish Kushwaha, Isaac Amundson, Xenofon D. Koutso...
CCS
2007
ACM
14 years 1 months ago
Panorama: capturing system-wide information flow for malware detection and analysis
Malicious programs spy on users’ behavior and compromise their privacy. Even software from reputable vendors, such as Google Desktop and Sony DRM media player, may perform undes...
Heng Yin, Dawn Xiaodong Song, Manuel Egele, Christ...
EDUTAINMENT
2007
Springer
14 years 1 months ago
Teaching Structured Development of Virtual Reality Systems Using P-VoT
Learning to build and test virtual reality (VR) systems is difficult due to the many required knowledge (e.g. computer graphics, sound processing, simulation, interaction, etc.) an...
Jinseok Seo, Gerard Jounghyun Kim
IPSN
2007
Springer
14 years 1 months ago
LaserSPECks: : laser SPECtroscopic trace-gas sensor networks - sensor integration and applications
We introduce a novel laser spectroscopic trace-gas sensor platform, LaserSPECks that integrates recently developed miniature quartz-enhanced photoacoustic spectroscopy (QEPAS) gas...
Stephen So, Farinaz Koushanfar, Anatoliy Kosterev,...