Sciweavers

24 search results - page 3 / 5
» Perverse Effects in Defense of Computer Systems: When More i...
Sort
View
ACSAC
2007
IEEE
14 years 2 months ago
Limits of Static Analysis for Malware Detection
Malicious code is an increasingly important problem that threatens the security of computer systems. The traditional line of defense against malware is composed of malware detecto...
Andreas Moser, Christopher Kruegel, Engin Kirda
SIGITE
2004
ACM
14 years 2 months ago
Experiences using tablet PCs in a programming laboratory
This experience report describes lessons learned using first generation tablet PCs to support active learning in an undergraduate computer science laboratory course. We learned th...
Stephen H. Edwards, N. Dwight Barnette
W2GIS
2009
Springer
14 years 3 months ago
Database and Representation Issues in Geographic Information Systems (GIS)
Abstract. A review is provided of some database and representation issues involved in the implementation of geographic information systems (GIS). The increasing popularity of web-b...
Hanan Samet
ICDCS
2007
IEEE
14 years 2 months ago
Differentiated Data Persistence with Priority Random Linear Codes
Both peer-to-peer and sensor networks have the fundamental characteristics of node churn and failures. Peers in P2P networks are highly dynamic, whereas sensors are not dependable...
Yunfeng Lin, Baochun Li, Ben Liang
CIKM
2004
Springer
14 years 1 months ago
The robustness of content-based search in hierarchical peer to peer networks
Hierarchical peer to peer networks with multiple directory services are an important architecture for large-scale file sharing due to their effectiveness and efficiency. Recent ...
M. Elena Renda, Jamie Callan