Sciweavers

2698 search results - page 387 / 540
» Software Process Model Blueprints
Sort
View
CCS
2010
ACM
15 years 2 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
115
Voted
MICRO
2007
IEEE
133views Hardware» more  MICRO 2007»
15 years 8 months ago
Revisiting the Sequential Programming Model for Multi-Core
Single-threaded programming is already considered a complicated task. The move to multi-threaded programming only increases the complexity and cost involved in software developmen...
Matthew J. Bridges, Neil Vachharajani, Yun Zhang, ...
TASLP
2010
134views more  TASLP 2010»
14 years 9 months ago
Multiple Fundamental Frequency Estimation by Modeling Spectral Peaks and Non-Peak Regions
This paper presents a maximum likelihood approach to multiple fundamental frequency (F0) estimation for a mixture of harmonic sound sources, where the power spectrum of a time fra...
Zhiyao Duan, Bryan Pardo, Changshui Zhang
211
Voted
VLDB
2007
ACM
155views Database» more  VLDB 2007»
16 years 2 months ago
Answering Aggregation Queries in a Secure System Model
As more sensitive data is captured in electronic form, security becomes more and more important. Data encryption is the main technique for achieving security. While in the past en...
Tingjian Ge, Stanley B. Zdonik
CONEXT
2006
ACM
15 years 8 months ago
Modeling ping times in first person shooter games
In First Person Shooter (FPS) games the Round Trip Time (RTT), i.e., the sum of the network delay from client to server and the network delay from server to client, impacts the ga...
Natalie Degrande, Danny De Vleeschauwer, Robert E....