Sciweavers

302 search results - page 61 / 61
» Precise Service Level Agreements
Sort
View
ACSAC
2005
IEEE
13 years 10 months ago
Stealth Breakpoints
Microscopic analysis of malicious code (malware) requires the aid of a variety of powerful tools. Chief among them is a debugger that enables runtime binary analysis at an instruc...
Amit Vasudevan, Ramesh Yerraballi
BTW
2005
Springer
112views Database» more  BTW 2005»
13 years 10 months ago
Valid Updates for Persistent XML Objects
: XML has emerged as the industry standard for representing and exchanging data and is already predominant in several applications today. Business, analytic and structered data wil...
Henrike Schuhart, Volker Linnemann