Sciweavers

668 search results - page 47 / 134
» Implementing and Evaluating Automatic Checkpointing
Sort
View
ACSAC
2006
IEEE
14 years 2 months ago
How to Automatically and Accurately Sandbox Microsoft IIS
Comparing the system call sequence of a network application against a sandboxing policy is a popular approach to detecting control-hijacking attack, in which the attacker exploits...
Wei Li, Lap-Chung Lam, Tzi-cker Chiueh
ACSAC
2006
IEEE
14 years 2 months ago
Back to the Future: A Framework for Automatic Malware Removal and System Repair
Malware is software with malicious intent. Besides viruses and worms, spyware, adware, and other newer forms of malware have recently emerged as widely-spread threats to system se...
Francis Hsu, Hao Chen, Thomas Ristenpart, Jason Li...
EMSOFT
2005
Springer
14 years 2 months ago
AutoDVS: an automatic, general-purpose, dynamic clock scheduling system for hand-held devices
We present AutoDVS, a dynamic voltage scaling (DVS) system for hand-held computers. Unlike extant DVS systems, AutoDVS distinguishes common, course-grain, program behavior and cou...
Selim Gurun, Chandra Krintz
TSC
2010
200views more  TSC 2010»
13 years 6 months ago
TQoS: Transactional and QoS-Aware Selection Algorithm for Automatic Web Service Composition
—Web Services are the most famous implementation of service oriented architectures that has brought some challenging research issues. One of these is the composition, i.e. the ca...
Joyce El Haddad, Maude Manouvrier, Marta Rukoz
ISSTA
2010
ACM
14 years 13 days ago
Automatic detection of unsafe component loadings
Dynamic loading of software components (e.g., libraries or modules) is a widely used mechanism for improved system modularity and flexibility. Correct component resolution is cri...
Taeho Kwon, Zhendong Su