Sciweavers

7124 search results - page 1270 / 1425
» Programming Languages and Operating Systems
Sort
View
149
Voted
SP
2007
IEEE
135views Security Privacy» more  SP 2007»
15 years 8 months ago
Exploring Multiple Execution Paths for Malware Analysis
Malicious code (or malware) is defined as software that fulfills the deliberately harmful intent of an attacker. Malware analysis is the process of determining the behavior and ...
Andreas Moser, Christopher Krügel, Engin Kird...
CLUSTER
2003
IEEE
15 years 7 months ago
Coordinated Checkpoint versus Message Log for Fault Tolerant MPI
— Large Clusters, high availability clusters and Grid deployments often suffer from network, node or operating system faults and thus require the use of fault tolerant programmin...
Aurelien Bouteiller, Pierre Lemarinier, Gér...
IAAI
2011
14 years 2 months ago
NewsFinder: Automating an Artificial Intelligence News Service
NewsFinder automates the steps involved in finding, selecting and publishing news stories that meet subjective judgments of relevance and interest to the Artificial Intelligence c...
Liang Dong, Reid G. Smith, Bruce G. Buchanan
EUROSYS
2006
ACM
15 years 11 months ago
Using queries for distributed monitoring and forensics
Distributed systems are hard to build, profile, debug, and test. Monitoring a distributed system – to detect and analyze bugs, test for regressions, identify fault-tolerance pr...
Atul Singh, Petros Maniatis, Timothy Roscoe, Peter...
CASES
2008
ACM
15 years 4 months ago
Reducing pressure in bounded DBT code caches
Dynamic binary translators (DBT) have recently attracted much attention for embedded systems. The effective implementation of DBT in these systems is challenging due to tight cons...
José Baiocchi, Bruce R. Childers, Jack W. D...
« Prev « First page 1270 / 1425 Last » Next »