Sciweavers

483 search results - page 83 / 97
» Experiences with Capsule-Based Active Networking
Sort
View
DSN
2009
IEEE
14 years 3 months ago
Fast memory state synchronization for virtualization-based fault tolerance
Virtualization provides the possibility of whole machine migration and thus enables a new form of fault tolerance that is completely transparent to applications and operating syst...
Maohua Lu, Tzi-cker Chiueh
NDSS
2009
IEEE
14 years 3 months ago
K-Tracer: A System for Extracting Kernel Malware Behavior
Kernel rootkits can provide user level-malware programs with the additional capabilities of hiding their malicious activities by altering the legitimate kernel behavior of an oper...
Andrea Lanzi, Monirul I. Sharif, Wenke Lee
DSN
2008
IEEE
14 years 2 months ago
Automated duplicate detection for bug tracking systems
Bug tracking systems are important tools that guide the maintenance activities of software developers. The utility of these systems is hampered by an excessive number of duplicate...
Nicholas Jalbert, Westley Weimer
ICRA
2008
IEEE
164views Robotics» more  ICRA 2008»
14 years 2 months ago
Bilateral energy transfer in delayed teleoperation on the time domain
— The time domain passivity framework is attracting interest as a method for granting stability in both telerobotics and haptic contexts; this paper employs this approach in orde...
Jordi Artigas, Carsten Preusche, Gerd Hirzinger, G...
NDSS
2008
IEEE
14 years 2 months ago
Impeding Malware Analysis Using Conditional Code Obfuscation
Malware programs that incorporate trigger-based behavior initiate malicious activities based on conditions satisfied only by specific inputs. State-of-the-art malware analyzers ...
Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffi...