Sciweavers

668 search results - page 47 / 134
» Implementing and Evaluating Automatic Checkpointing
Sort
View
119
Voted
ACSAC
2006
IEEE
15 years 8 months ago
How to Automatically and Accurately Sandbox Microsoft IIS
Comparing the system call sequence of a network application against a sandboxing policy is a popular approach to detecting control-hijacking attack, in which the attacker exploits...
Wei Li, Lap-Chung Lam, Tzi-cker Chiueh
115
Voted
ACSAC
2006
IEEE
15 years 8 months ago
Back to the Future: A Framework for Automatic Malware Removal and System Repair
Malware is software with malicious intent. Besides viruses and worms, spyware, adware, and other newer forms of malware have recently emerged as widely-spread threats to system se...
Francis Hsu, Hao Chen, Thomas Ristenpart, Jason Li...
109
Voted
EMSOFT
2005
Springer
15 years 8 months ago
AutoDVS: an automatic, general-purpose, dynamic clock scheduling system for hand-held devices
We present AutoDVS, a dynamic voltage scaling (DVS) system for hand-held computers. Unlike extant DVS systems, AutoDVS distinguishes common, course-grain, program behavior and cou...
Selim Gurun, Chandra Krintz
141
Voted
TSC
2010
200views more  TSC 2010»
15 years 29 days ago
TQoS: Transactional and QoS-Aware Selection Algorithm for Automatic Web Service Composition
—Web Services are the most famous implementation of service oriented architectures that has brought some challenging research issues. One of these is the composition, i.e. the ca...
Joyce El Haddad, Maude Manouvrier, Marta Rukoz
146
Voted
ISSTA
2010
ACM
15 years 6 months ago
Automatic detection of unsafe component loadings
Dynamic loading of software components (e.g., libraries or modules) is a widely used mechanism for improved system modularity and flexibility. Correct component resolution is cri...
Taeho Kwon, Zhendong Su