Sciweavers

1421 search results - page 137 / 285
» The First and Second Max-SAT Evaluations
Sort
View
RAID
2007
Springer
14 years 4 months ago
Emulation-Based Detection of Non-self-contained Polymorphic Shellcode
Network-level emulation has recently been proposed as a method for the accurate detection of previously unknown polymorphic code injection attacks. In this paper, we extend network...
Michalis Polychronakis, Kostas G. Anagnostakis, Ev...
SEMWEB
2007
Springer
14 years 4 months ago
Data Mining to Support Engineering Design Decision
The design and maintenance of an aero-engine generates a significant amount of documentation. When designing new engines, engineers must obtain knowledge gained from maintenance o...
Pooja Jadhav, Sylvia C. Wong, Gary B. Wills, Richa...
VLDB
2007
ACM
166views Database» more  VLDB 2007»
14 years 4 months ago
To Share or Not To Share?
Intuitively, aggressive work sharing among concurrent queries in a database system should always improve performance by eliminating redundant computation or data accesses. We show...
Ryan Johnson, Nikos Hardavellas, Ippokratis Pandis...
VLSI
2007
Springer
14 years 4 months ago
Impact of hardware emulation on the verification quality improvement
— Software simulation remains the most used method for VHDL RTL functional verification. The functional verification process essentially consists of two parts. The first one is t...
Youssef Serrestou, Vincent Beroulle, Chantal Robac...
CCGRID
2006
IEEE
14 years 4 months ago
PhoenixG: A Unified Management Framework for Industrial Information Grid
Industrial Information Grid (IIG) is a special kind of Grid system, the users of which exclusively own geographically distributed resources for Web service applications and try to...
Jianfeng Zhan, Gengpu Liu, Lei Wang, Bibo Tu, Yi J...