Sciweavers

26957 search results - page 118 / 5392
» Information Systems Modernization
Sort
View
GECCO
2009
Springer
138views Optimization» more  GECCO 2009»
14 years 4 months ago
IMAD: in-execution malware analysis and detection
The sophistication of computer malware is becoming a serious threat to the information technology infrastructure, which is the backbone of modern e-commerce systems. We, therefore...
Syed Bilal Mehdi, Ajay Kumar Tanwani, Muddassar Fa...
ICASSP
2009
IEEE
13 years 7 months ago
Log-likelihood ratio clipping in MIMO-BICM systems: Information geometric analysis and impact on system capacity
The clipping of log-likelihood ratios (LLRs) in soft demodulators for multiple-input multiple-output (MIMO) systems with bitinterleaved coded modulation (BICM) was recently observ...
Stefan Schwandter, Peter Fertl, Clemens Novak, Ger...
JCIT
2007
103views more  JCIT 2007»
13 years 9 months ago
Distributed Systems: An Effective Information Sharing Approach for Legacy Systems
An important issue of distributed systems is interoperability. Lack of interoperability between distributed systems is a common problem with current and legacy applications. Since...
S. Kami Makki
CCS
2004
ACM
14 years 3 months ago
Formally verifying information flow type systems for concurrent and thread systems
Information flow type systems provide an elegant means to enforce confidentiality of programs. Using the proof assistant Isabelle/HOL, we have machine-checked a recent work of B...
Gilles Barthe, Leonor Prensa Nieto
IJSSE
2010
80views more  IJSSE 2010»
13 years 7 months ago
Improving Memory Management Security for C and C++
Memory managers are an important part of any modern language: they are used to dynamically allocate memory for use in the program. Many managers exist and depending on the operati...
Yves Younan, Wouter Joosen, Frank Piessens, Hans V...