Sciweavers

5314 search results - page 884 / 1063
» Hybrid Dynamic Programming
Sort
View
108
Voted
NDSS
2009
IEEE
15 years 9 months ago
K-Tracer: A System for Extracting Kernel Malware Behavior
Kernel rootkits can provide user level-malware programs with the additional capabilities of hiding their malicious activities by altering the legitimate kernel behavior of an oper...
Andrea Lanzi, Monirul I. Sharif, Wenke Lee
ICNP
2009
IEEE
15 years 9 months ago
Scalable Video Multicast in Multi-carrier Wireless Data Systems
—Future 4G cellular networks are featured with high data rate and improved coverage, which will enable realtime video multicast and broadcast services. Scalable video coding is v...
Peilong Li, Honghai Zhang, Baohua Zhao, Sampath Ra...
106
Voted
ICPP
2009
IEEE
15 years 9 months ago
Integrated Performance Views in Charm++: Projections Meets TAU
Abstract—The Charm++ parallel programming system provides a modular performance interface that can be used to extend its performance measurement and analysis capabilities. The in...
Scott Biersdorff, Chee Wai Lee, Allen D. Malony, L...
106
Voted
ICSM
2009
IEEE
15 years 9 months ago
Modularizing error recovery
Error recovery is an integral concern in compilers. Improving error recovery requires comprehension of a large and complex code base, in order to locate the places which raise err...
Jeeva Paudel, Christopher Dutchyn
152
Voted
ICST
2009
IEEE
15 years 9 months ago
Transforming and Selecting Functional Test Cases for Security Policy Testing
In this paper, we consider typical applications in which the business logic is separated from the access control logic, implemented in an independent component, called the Policy ...
Tejeddine Mouelhi, Yves Le Traon, Benoit Baudry