Sciweavers

927 search results - page 183 / 186
» Measuring Consistency Costs for Distributed Shared Data
Sort
View
DIMVA
2008
13 years 10 months ago
Embedded Malware Detection Using Markov n-Grams
Embedded malware is a recently discovered security threat that allows malcode to be hidden inside a benign file. It has been shown that embedded malware is not detected by commerci...
M. Zubair Shafiq, Syed Ali Khayam, Muddassar Faroo...
RTSS
2007
IEEE
14 years 2 months ago
FireFly Mosaic: A Vision-Enabled Wireless Sensor Networking System
— With the advent of CMOS cameras, it is now possible to make compact, cheap and low-power image sensors capable of on-board image processing. These embedded vision sensors provi...
Anthony Rowe, Dhiraj Goel, Raj Rajkumar
ASPLOS
2009
ACM
14 years 9 months ago
TwinDrivers: semi-automatic derivation of fast and safe hypervisor network drivers from guest OS drivers
In a virtualized environment, device drivers are often run inside a virtual machine (VM) rather than in the hypervisor, for reasons of safety and reduction in software engineering...
Aravind Menon, Simon Schubert, Willy Zwaenepoel
VLDB
1995
ACM
97views Database» more  VLDB 1995»
14 years 4 days ago
Processing Object-Oriented Queries with Invertible Late Bound Functions
New demandsare put on query processing in Object-Oriented(00) databasesto provide efficient andrelationally completequery languages. A flexible 00 data model requires overloading ...
Staffan Flodin, Tore Risch
IHI
2012
287views Healthcare» more  IHI 2012»
12 years 4 months ago
MARHS: mobility assessment system with remote healthcare functionality for movement disorders
Due to the global trend of aging societies with increasing demand for low cost and high quality healthcare services, there has been extensive research and development directed tow...
Sunghoon Ivan Lee, Jonathan Woodbridge, Ani Nahape...