Sciweavers

1021 search results - page 109 / 205
» Pure Subtype Systems
Sort
View
P2P
2006
IEEE
120views Communications» more  P2P 2006»
14 years 1 months ago
Risk Driven Semantic P2P Service Retrieval
In this paper, we present a novel approach, named RS2D, to risk driven semantic service query routing in unstructured, so called pure P2P networks. Following the RS2D protocol, ea...
Matthias Klusch, Ulrich Basters
SADFE
2005
IEEE
14 years 1 months ago
SecSyslog: an Approach to Secure Logging Based on Covert Channels
Today log traces are widely used to identify and prevent violations of corporate information systems. The most recent logging trend is to manage most level 3 ISO/OSI traffic via p...
Dario V. Forte, Cristiano Maruti, Michele R. Vettu...
SP
2005
IEEE
131views Security Privacy» more  SP 2005»
14 years 1 months ago
Semantics-Aware Malware Detection
A malware detector is a system that attempts to determine whether a program has malicious intent. In order to evade detection, malware writers (hackers) frequently use obfuscation...
Mihai Christodorescu, Somesh Jha, Sanjit A. Seshia...
MHCI
2005
Springer
14 years 1 months ago
Navigation control for mobile virtual environments
In this paper, we describe a project which uses PDAs to provide an interactive experience with a virtual environment. In particular, we focus on the navigational aspects of allowi...
Gary Marsden, Nicholas Tip
PADL
2005
Springer
14 years 1 months ago
Functional Framework for Sound Synthesis
We present an application of functional programming in the domain of sound generation and processing. We use the lazy language Clean to define purely functional stream generators,...
Jerzy Karczmarczuk