Sciweavers

42 search results - page 8 / 9
» Revealing Packed Malware
Sort
View
SMA
2010
ACM
204views Solid Modeling» more  SMA 2010»
13 years 7 months ago
Topologically correct reconstruction of tortuous contour forests
Electrophysiological modeling of dendrites and other neurological processes is generally done in a simplified manner, by treating these structures as a series of cylinders (aka ca...
John Edwards, Chandrajit L. Bajaj
TWC
2008
112views more  TWC 2008»
13 years 7 months ago
Throughput Analysis of TCP-Friendly Rate Control in Mobile Hotspots
By integrating wireless wide area networks (WWANs) and wireless local area networks (WLANs), mobile hotspot technologies enable seamless Internet multimedia services to users on-bo...
Sangheon Pack, Xuemin Shen, Jon W. Mark, Lin Cai
TIP
2010
119views more  TIP 2010»
13 years 2 months ago
Software Designs of Image Processing Tasks With Incremental Refinement of Computation
Software realizations of computationally-demanding image processing tasks (e.g. image transforms and convolution) do not currently provide graceful degradation when their clock-cy...
Davide Anastasia, Yiannis Andreopoulos
CORR
2010
Springer
94views Education» more  CORR 2010»
13 years 7 months ago
Is Content Publishing in BitTorrent Altruistic or Profit-Driven
BitTorrent is the most popular P2P content delivery application where individual users share various type of content with tens of thousands of other users. The growing popularity ...
Rubén Cuevas Rumín, Michal Kryczka, ...
CONEXT
2010
ACM
13 years 5 months ago
Is content publishing in BitTorrent altruistic or profit-driven?
BitTorrent is the most popular P2P content delivery application where individual users share various type of content with tens of thousands of other users. The growing popularity ...
Rubén Cuevas Rumín, Michal Kryczka, ...