Sciweavers

625 search results - page 95 / 125
» On the direct limit of a direct system of multialgebras
Sort
View
RAID
2010
Springer
13 years 6 months ago
Kernel Malware Analysis with Un-tampered and Temporal Views of Dynamic Kernel Memory
Dynamic kernel memory has been a popular target of recent kernel malware due to the difficulty of determining the status of volatile dynamic kernel objects. Some existing approach...
Junghwan Rhee, Ryan Riley, Dongyan Xu, Xuxian Jian...
IMC
2010
ACM
13 years 5 months ago
CloudCmp: comparing public cloud providers
While many public cloud providers offer pay-as-you-go computing, their varying approaches to infrastructure, virtualization, and software services lead to a problem of plenty. To ...
Ang Li, Xiaowei Yang, Srikanth Kandula, Ming Zhang
SADFE
2010
IEEE
13 years 5 months ago
Fonts for Forensics
: Like other latent evidence that cannot be directly perceived by people, bit sequences have to be presented through tools. Presentations of digital forensic evidence often involve...
Fred Cohen
COMPGEOM
2009
ACM
13 years 5 months ago
Geometric tomography: a limited-view approach for computed tomography
Computed tomography(CT), especially since the introduction of helical CT, provides excellent visualization of the internal organs of the body. As a result, CT is used routinely in...
Peter B. Noël, Jinhui Xu, Kenneth R. Hoffmann...
MMM
2009
Springer
169views Multimedia» more  MMM 2009»
14 years 4 months ago
Personalized Image Recommendation
—In this paper, we have developed a novel framework called JustClick to enable personalized image recommendation via exploratory search from large-scale collections of manuallyan...
Yuli Gao, Hangzai Luo, Jianping Fan