Sciweavers

1542 search results - page 243 / 309
» The Observational Power of Clocks
Sort
View
WORM
2003
13 years 11 months ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...
WSC
1997
13 years 11 months ago
Long-Lasting Transient Conditions in Simulations with Heavy-Tailed Workloads
Recent evidence suggests that some characteristics of computer and telecommunications systems may be well described using heavy tailed distributions — distributions whose tail d...
Mark Crovella, Lester Lipsky
AIPS
2009
13 years 11 months ago
A Decision-Theoretic Approach to Dynamic Sensor Selection in Camera Networks
Nowadays many urban areas have been equipped with networks of surveillance cameras, which can be used for automatic localization and tracking of people. However, given the large r...
Matthijs T. J. Spaan, Pedro U. Lima
ICASSP
2010
IEEE
13 years 10 months ago
Sparse Bayesian step-filtering for high-throughput analysis of molecular machine dynamics
Nature has evolved many molecular machines such as kinesin, myosin, and the rotary flagellar motor powered by an ion current from the mitochondria. Direct observation of the step-...
Max A. Little, Nick S. Jones
ICASSP
2010
IEEE
13 years 10 months ago
Multiantenna spectrum sensing: Detection of spatial correlation among time-series with unknown spectra
One of the key problems in cognitive radio (CR) is the detection of primary activity in order to determine which parts of the spectrum are available for opportunistic access. This...
David Ramírez, Javier Vía, Ignacio S...