Sciweavers

127 search results - page 22 / 26
» scopes 2005
Sort
View
ACSAC
2005
IEEE
14 years 1 months ago
Stealth Breakpoints
Microscopic analysis of malicious code (malware) requires the aid of a variety of powerful tools. Chief among them is a debugger that enables runtime binary analysis at an instruc...
Amit Vasudevan, Ramesh Yerraballi
CEC
2005
IEEE
14 years 1 months ago
Sensorimotor experience and its metrics: informational geometry and the temporal horizon
Abstract- We introduce metrics on sensorimotor experience at various temporal scales based on informationtheory. Sensorimotor variables through which the experience of an agent fl...
Chrystopher L. Nehaniv
CODES
2005
IEEE
14 years 1 months ago
Enhancing security through hardware-assisted run-time validation of program data properties
The growing number of information security breaches in electronic and computing systems calls for new design paradigms that consider security as a primary design objective. This i...
Divya Arora, Anand Raghunathan, Srivaths Ravi, Nir...
CSB
2005
IEEE
152views Bioinformatics» more  CSB 2005»
14 years 1 months ago
Consensus Genetic Maps: A Graph Theoretic Approach
A genetic map is an ordering of genetic markers constructed from genetic linkage data for use in linkage studies and experimental design. While traditional methods have focused on...
Benjamin G. Jackson, Srinivas Aluru, Patrick S. Sc...
HPDC
2005
IEEE
14 years 1 months ago
Collective caching: application-aware client-side file caching
Parallel file subsystems in today’s high-performance computers adopt many I/O optimization strategies that were designed for distributed systems. These strategies, for instance...
Wei-keng Liao, Kenin Coloma, Alok N. Choudhary, Le...