Sciweavers

42 search results - page 7 / 9
» Structural monitoring using engineer-computer interaction
Sort
View
ACSC
2006
IEEE
14 years 2 months ago
SPiKE: engineering malware analysis tools using unobtrusive binary-instrumentation
Malware — a generic term that encompasses viruses, trojans, spywares and other intrusive code — is widespread today. Malware analysis is a multi-step process providing insight...
Amit Vasudevan, Ramesh Yerraballi
CCS
2009
ACM
14 years 3 months ago
Keep your friends close: the necessity for updating an anomaly sensor with legitimate environment changes
Large-scale distributed systems have dense, complex code-bases that are assumed to perform multiple and inter-dependent tasks while user interaction is present. The way users inte...
Angelos Stavrou, Gabriela F. Cretu-Ciocarlie, Mich...
COORDINATION
2005
Springer
14 years 1 months ago
Coordination Systems in Role-Based Adaptive Software
Software systems are becoming more open, distributed, pervasive, and connected. In such systems, the relationships between loosely-coupled application elements become non-determini...
Alan W. Colman, Jun Han
DSOM
1999
Springer
14 years 21 days ago
Derivation of Backup Service Management Applications from Service and System Models
The backup of large data sets is preferably performed automatically outside of regular working hours. In highly structured computer networks, however, faults and exceptions may rel...
Ingo Lück, Marcus Schönbach, Arnulf Mest...
VR
2008
IEEE
173views Virtual Reality» more  VR 2008»
14 years 2 months ago
Rapid Creation of Large-scale Photorealistic Virtual Environments
The rapid and efficient creation of virtual environments has become a crucial part of virtual reality applications. In particular, civil and defense applications often require an...
Charalambos Poullis, Suya You, Ulrich Neumann