Sciweavers

1336 search results - page 116 / 268
» SMTP Path Analysis
Sort
View
ICST
2008
IEEE
14 years 3 months ago
Empirical Software Change Impact Analysis using Singular Value Decomposition
Verification and validation techniques often generate various forms of software development artifacts. Change records created from verification and validation efforts show how fil...
Mark Sherriff, Laurie Williams
NDSS
2008
IEEE
14 years 3 months ago
Impeding Malware Analysis Using Conditional Code Obfuscation
Malware programs that incorporate trigger-based behavior initiate malicious activities based on conditions satisfied only by specific inputs. State-of-the-art malware analyzers ...
Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffi...
ACSAC
2007
IEEE
14 years 3 months ago
Fine-Grained Information Flow Analysis and Enforcement in a Java Virtual Machine
We have implemented an information flow framework for the Java Virtual Machine that combines static and dynamic techniques to capture not only explicit flows, but also implicit ...
Deepak Chandra, Michael Franz
ICC
2007
IEEE
14 years 3 months ago
Performance Analysis of SINEMO: Seamless IP-Diversity Based Network Mobility
Abstract— IETF has proposed Mobile IPv6-based Network Mobility (NEMO) basic support protocol (BSP) to support network mobility. NEMO BSP inherits all the drawbacks of Mobile IPv6...
Pulak K. Chowdhury, Abu S. Reaz, Mohammed Atiquzza...
FPGA
2007
ACM
142views FPGA» more  FPGA 2007»
14 years 3 months ago
Parametric yield in FPGAs due to within-die delay variations: a quantitative analysis
Variations in the semiconductor fabrication process results in variability in parameters between transistors on the same die, a problem exacerbated by lithographic scaling. The re...
N. Pete Sedcole, Peter Y. K. Cheung