Sciweavers

1744 search results - page 144 / 349
» The Steganographic File System
Sort
View
141
Voted
CASCON
1996
154views Education» more  CASCON 1996»
15 years 5 months ago
Navigating the textual redundancy web in legacy source
Understanding the source, data, and documentation files associated with legacy systems in preparation for maintenance or reengineering is an increasingly important problem for man...
J. Howard Johnson
119
Voted
CIIA
2009
15 years 4 months ago
PNTools: a Multi-Language Environment to Integrate Petri Nets Tools
The power of Petri nets resides on the availability of several tools for analysis and verification of properties of systems. Users have to combine the functionality of tools in dif...
Allaoua Chaoui, Ismail Hadjadj
102
Voted
CORR
2010
Springer
131views Education» more  CORR 2010»
15 years 3 months ago
Detecting Botnets Through Log Correlation
Botnets, which consist of thousands of compromised machines, can cause significant threats to other systems by launching Distributed Denial of Service (DDoS) attacks, keylogging, a...
Yousof Al-Hammadi, Uwe Aickelin
128
Voted
CIS
2009
Springer
15 years 7 months ago
A Virus Detection System Based on Artificial Immune System
A virus detection system (VDS) based on artificial immune system (AIS) is proposed in this paper. VDS at first generates the detector set from virus files in the dataset, negative ...
Rui Chao, Ying Tan
138
Voted
IPPS
1997
IEEE
15 years 7 months ago
Designing Efficient Distributed Algorithms Using Sampling Techniques
In this paper we show the power of sampling techniques in designing efficient distributed algorithms. In particular, we show that using sampling techniques, on some networks, sele...
Sanguthevar Rajasekaran, David S. L. Wei