Sciweavers

83 search results - page 11 / 17
» Advanced Software Protection Now
Sort
View
CCS
2010
ACM
14 years 10 months ago
BLADE: an attack-agnostic approach for preventing drive-by malware infections
Web-based surreptitious malware infections (i.e., drive-by downloads) have become the primary method used to deliver malicious software onto computers across the Internet. To addr...
Long Lu, Vinod Yegneswaran, Phillip A. Porras, Wen...
WILF
2005
Springer
86views Fuzzy Logic» more  WILF 2005»
15 years 3 months ago
Intelligent Track Analysis on Navy Platforms Using Soft Computing
We have developed and continue to enhance automated intelligent software that performs the tasks and decision making which now occurs by the personnel manning watch stations in the...
Robert Richards, Richard Stottler, Ben Ball, Cosku...
ADAEUROPE
2010
Springer
15 years 2 months ago
What to Make of Multicore Processors for Reliable Real-Time Systems?
Now that multicore microprocessors have become a commodity, it is natural to think about employing them in all kinds of computing, including high-reliability embedded real-time sy...
Theodore P. Baker
VAMOS
2010
Springer
14 years 11 months ago
Using Collaborations to Encapsulate Features? An Explorative Study
A feature is a program characteristic visible to an end-user. Current research strives to encapsulate the implementation of a feature in a module. Jak is a language extension to Ja...
Martin Kuhlemann, Norbert Siegmund, Sven Apel
TCAD
2011
14 years 4 months ago
High-Level Synthesis for FPGAs: From Prototyping to Deployment
—Escalating system-on-chip design complexity is the design community to raise the level of abstraction beyond register transfer level. Despite the unsuccessful adoptions of early...
Jason Cong, Bin Liu, Stephen Neuendorffer, Juanjo ...