Sciweavers

298 search results - page 57 / 60
» Towards experimental evaluation of code obfuscation techniqu...
Sort
View
DSN
2009
IEEE
14 years 3 months ago
On the effectiveness of structural detection and defense against P2P-based botnets
Recently, peer-to-peer (P2P) networks have emerged as a covert communication platform for malicious programs known as bots. As popular distributed systems, they allow bots to comm...
Duc T. Ha, Guanhua Yan, Stephan Eidenbenz, Hung Q....
SSD
1999
Springer
106views Database» more  SSD 1999»
14 years 28 days ago
XZ-Ordering: A Space-Filling Curve for Objects with Spatial Extension
There is an increasing need to integrate spatial index structures into commercial database management systems. In geographic information systems (GIS), huge amounts of information ...
Christian Böhm, Gerald Klump, Hans-Peter Krie...
CASES
2007
ACM
14 years 21 days ago
A simplified java bytecode compilation system for resource-constrained embedded processors
Embedded platforms are resource-constrained systems in which performance and memory requirements of executed code are of critical importance. However, standard techniques such as ...
Carmen Badea, Alexandru Nicolau, Alexander V. Veid...
GECCO
2008
Springer
238views Optimization» more  GECCO 2008»
13 years 9 months ago
Using multiple offspring sampling to guide genetic algorithms to solve permutation problems
The correct choice of an evolutionary algorithm, a genetic representation for the problem being solved (as well as their associated variation operators) and the appropriate values...
Antonio LaTorre, José Manuel Peña, V...
EUROPAR
2010
Springer
13 years 9 months ago
Optimized On-Chip-Pipelined Mergesort on the Cell/B.E
Abstract. Limited bandwidth to off-chip main memory is a performance bottleneck in chip multiprocessors for streaming computations, such as Cell/B.E., and this will become even mor...
Rikard Hultén, Christoph W. Kessler, Jö...