Sciweavers

60 search results - page 12 / 12
» Microsoft windows programming strategies
Sort
View
SP
2010
IEEE
220views Security Privacy» more  SP 2010»
13 years 9 months ago
TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection
—Fuzz testing has proven successful in finding security vulnerabilities in large programs. However, traditional fuzz testing tools have a well-known common drawback: they are in...
Tielei Wang, Tao Wei, Guofei Gu, Wei Zou
CP
2003
Springer
13 years 11 months ago
Generating High Quality Schedules for a Spacecraft Memory Downlink Problem
This work introduces a combinatorial optimization problem called Mars Express Memory Dumping Problem (Mex-Mdp), which arises in the European Space Agency program Mars Express. It c...
Angelo Oddi, Nicola Policella, Amedeo Cesta, Gabri...
SEC
2008
13 years 7 months ago
HoneyID : Unveiling Hidden Spywares by Generating Bogus Events
A particular type of spyware which uses the user's events covertly, such as keyloggers and password stealers, has become a big threat to Internet users. Due to the prevalence ...
Jeheon Han, Jonghoon Kwon, Heejo Lee
BMCBI
2007
89views more  BMCBI 2007»
13 years 6 months ago
msmsEval: tandem mass spectral quality assignment for high-throughput proteomics
Background: In proteomics experiments, database-search programs are the method of choice for protein identification from tandem mass spectra. As amino acid sequence databases grow...
Jason W. H. Wong, Matthew J. Sullivan, Hugh M. Car...
ICDCS
2012
IEEE
11 years 8 months ago
Towards Optimal Capacity Segmentation with Hybrid Cloud Pricing
—Cloud resources are usually priced in multiple markets with different service guarantees. For example, Amazon EC2 prices virtual instances under three pricing schemes — the su...
Wei Wang, Baochun Li, Ben Liang