Sciweavers

8689 search results - page 1733 / 1738
» Software: hard data
Sort
View
ACSAC
2010
IEEE
13 years 6 months ago
Comprehensive shellcode detection using runtime heuristics
A promising method for the detection of previously unknown code injection attacks is the identification of the shellcode that is part of the attack vector using payload execution....
Michalis Polychronakis, Kostas G. Anagnostakis, Ev...
GROUP
2010
ACM
13 years 6 months ago
Design, implementation, and evaluation of an approach for determining when programmers are having difficulty
Previous research has motivated the idea of automatically determining when programmers are having difficulty, provided an initial algorithm (unimplemented in an actual system), an...
Jason Carter, Prasun Dewan
ICRA
2010
IEEE
178views Robotics» more  ICRA 2010»
13 years 6 months ago
Biomimetic optic flow sensing applied to a lunar landing scenario
Autonomous landing on unknown extraterrestrial bodies requires fast, noise-resistant motion processing to elicit appropriate steering commands. Flying insects excellently master vi...
Florent Valette, Franck Ruffier, Stéphane V...
INFOCOM
2010
IEEE
13 years 6 months ago
Measurement and Diagnosis of Address Misconfigured P2P Traffic
Misconfigured P2P traffic caused by bugs in volunteer-developed P2P software or by attackers is prevalent. It influences both end users and ISPs. In this paper, we discover and stu...
Zhichun Li, Anup Goyal, Yan Chen, Aleksandar Kuzma...
ICNP
2009
IEEE
13 years 6 months ago
DirCast: A Practical and Efficient Wi-Fi Multicast System
Abstract--IP multicast applications such as live lecture broadcasts are being increasingly used in enterprise and campus networks. In many cases, end hosts access these multicast s...
Ranveer Chandra, Sandeep Karanth, Thomas Moscibrod...
« Prev « First page 1733 / 1738 Last » Next »