Sciweavers

4250 search results - page 849 / 850
» Understanding the Requirements on Modelling Techniques
Sort
View
ACSAC
2010
IEEE
13 years 3 months ago
Cujo: efficient detection and prevention of drive-by-download attacks
The JavaScript language is a core component of active and dynamic web content in the Internet today. Besides its great success in enhancing web applications, however, JavaScript p...
Konrad Rieck, Tammo Krueger, Andreas Dewald
CODES
2010
IEEE
13 years 3 months ago
Statistical approach in a system level methodology to deal with process variation
The impact of process variation in state of the art technology makes traditional (worst case) designs unnecessarily pessimistic, which translates to suboptimal designs in terms of...
Concepción Sanz Pineda, Manuel Prieto, Jos&...
ISW
2010
Springer
13 years 3 months ago
Artificial Malware Immunization Based on Dynamically Assigned Sense of Self
Computer malwares (e.g., botnets, rootkits, spware) are one of the most serious threats to all computers and networks. Most malwares conduct their malicious actions via hijacking t...
Xinyuan Wang, Xuxian Jiang
BMCBI
2010
145views more  BMCBI 2010»
13 years 23 days ago
Directionality in protein fold prediction
Background: Ever since the ground-breaking work of Anfinsen et al. in which a denatured protein was found to refold to its native state, it has been frequently stated by the prote...
Jonathan J. Ellis, Fabien P. E. Huard, Charlotte M...
COMCOM
2011
13 years 23 days ago
Volume-aware positioning in the context of a marine port terminal
The rapid proliferation of mobile computing devices and local wireless networks over the past few years has promoted a continuously growing interest in location-aware systems and ...
Yesid Jarma, Golnaz Karbaschi, Marcelo Dias de Amo...