Sciweavers

241 search results - page 38 / 49
» Predicting vulnerable software components
Sort
View
CCS
2008
ACM
13 years 9 months ago
Ether: malware analysis via hardware virtualization extensions
Malware has become the centerpiece of most security threats on the Internet. Malware analysis is an essential technology that extracts the runtime behavior of malware, and supplie...
Artem Dinaburg, Paul Royal, Monirul I. Sharif, Wen...
OPODIS
2004
13 years 9 months ago
Embedded Systems - Challenges and Work Directions
Embedded Systems are components integrating software and hardware jointly and specifically designed to provide given functionalities. These components may be used in many different...
Joseph Sifakis
ISORC
2008
IEEE
14 years 1 months ago
QoS Aware Dependable Distributed Stream Processing
In this paper we describe our approach for developing a QoS-aware, dependable execution environment for large-scale distributed stream processing applications. Distributed stream ...
Vana Kalogeraki, Dimitrios Gunopulos, Ravi S. Sand...
SOCA
2010
IEEE
13 years 6 months ago
Short-term performance management by priority-based queueing
Service-based IT infrastructures serve many different business processes on a shared infrastructure in parallel. The automated request execution on the interconnected software com...
Christian Markl, Oliver Hühn, Martin Bichler
ICRA
2006
IEEE
99views Robotics» more  ICRA 2006»
14 years 1 months ago
Characterization of Protein based Spring-like Elastic Joints for Biorobotic Applications
—This paper presents a molecular mechanics study using a molecular dynamics software (NAMD) for characterization of molecular elastic joints for bio nanorobotic prototyping. Simp...
Mustapha Hamdi, Gaurav Sharma, Antoine Ferreira, C...