Sciweavers

363 search results - page 57 / 73
» Modeling Attack Behaviors in Rating Systems
Sort
View
ASPLOS
2006
ACM
14 years 1 months ago
Temporal search: detecting hidden malware timebombs with virtual machines
Worms, viruses, and other malware can be ticking bombs counting down to a specific time, when they might, for example, delete files or download new instructions from a public we...
Jedidiah R. Crandall, Gary Wassermann, Daniela A. ...
RTAS
2005
IEEE
14 years 1 months ago
On Schedulability Bounds of Static Priority Schedulers
—Real-time systems need to use the schedulability test to determine whether or not admitted tasks can meet their deadlines. The utilization based schedulability test is the most ...
Jianjia Wu, Jyh-Charn Liu, Wei Zhao
EUROCAST
2007
Springer
161views Hardware» more  EUROCAST 2007»
13 years 11 months ago
Using Verification Technology to Specify and Detect Malware
Abstract. Computer viruses and worms are major threats for our computer infrastructure, and thus, for economy and society at large. Recent work has demonstrated that a model checki...
Andreas Holzer, Johannes Kinder, Helmut Veith
APJOR
2008
91views more  APJOR 2008»
13 years 7 months ago
Stability in Queueing Networks via the Finite Decomposition Property
Determination of the stability behavior of a queueing network is an important part of analyzing such systems. In Gamarnik and Hasenbein (2005) it is shown if a fluid network has t...
Utku Yildirim, John J. Hasenbein
TROB
2008
107views more  TROB 2008»
13 years 7 months ago
Templates and Anchors for Antenna-Based Wall Following in Cockroaches and Robots
The interplay between robotics and neuromechanics facilitates discoveries in both fields: nature provides roboticists with design ideas, while robotics research elucidates critical...
J. Lee, S. N. Sponberg, Owen Y. Loh, Andrew G. Lam...