Sciweavers

8056 search results - page 1510 / 1612
» Object Behavior Analysis
Sort
View
110
Voted
NSPW
2003
ACM
15 years 8 months ago
SELF: a transparent security extension for ELF binaries
The ability to analyze and modify binaries is often very useful from a security viewpoint. Security operations one would like to perform on binaries include the ability to extract...
Daniel C. DuVarney, V. N. Venkatakrishnan, Sandeep...
145
Voted
PLDI
2003
ACM
15 years 8 months ago
Bug isolation via remote program sampling
We propose a low-overhead sampling infrastructure for gathering information from the executions experienced by a program’s user community. Several example applications illustrat...
Ben Liblit, Alexander Aiken, Alice X. Zheng, Micha...
148
Voted
SIGMETRICS
2003
ACM
165views Hardware» more  SIGMETRICS 2003»
15 years 8 months ago
A hybrid systems modeling framework for fast and accurate simulation of data communication networks
In this paper we present a general hybrid systems modeling framework to describe the flow of traffic in communication networks. To characterize network behavior, these models use...
Stephan Bohacek, João P. Hespanha, Junsoo L...
116
Voted
SIGMETRICS
2003
ACM
136views Hardware» more  SIGMETRICS 2003»
15 years 8 months ago
Internet intrusions: global characteristics and prevalence
Network intrusions have been a fact of life in the Internet for many years. However, as is the case with many other types of Internet-wide phenomena, gaining insight into the glob...
Vinod Yegneswaran, Paul Barford, Johannes Ullrich
133
Voted
SIGMETRICS
2003
ACM
119views Hardware» more  SIGMETRICS 2003»
15 years 8 months ago
Incrementally improving lookup latency in distributed hash table systems
Distributed hash table (DHT) systems are an important class of peer-to-peer routing infrastructures. They enable scalable wide-area storage and retrieval of information, and will ...
Hui Zhang 0002, Ashish Goel, Ramesh Govindan
« Prev « First page 1510 / 1612 Last » Next »