Sciweavers

13841 search results - page 2574 / 2769
» Algorithms and Constraint Programming
Sort
View
130
Voted
ACSAC
2006
IEEE
15 years 9 months ago
PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware
Modern malware often hide the malicious portion of their program code by making it appear as data at compiletime and transforming it back into executable code at runtime. This obf...
Paul Royal, Mitch Halpin, David Dagon, Robert Edmo...
146
Voted
AINA
2006
IEEE
15 years 9 months ago
HyMoNet: a peer-to-peer hybrid multicast overlay network for efficient live media streaming
This paper presents HyMoNet, a peer-to-peer hybrid multicast overlay network for efficient live media streaming. The system comprises two parts: service infrastructure and user sp...
Bin Chang, Yuanchun Shi, Nan Zhang
CBMS
2006
IEEE
15 years 9 months ago
Pre-Indexing for Fast Partial Shape Matching of Vertebrae Images
Fast retrieval of images from large databases especially from large medical image databases is of great interest to researchers. We have developed shape-based image retrieval syst...
Xiaoqian Xu, D. J. Lee, Sameer Antani, L. Rodney L...
CODES
2006
IEEE
15 years 9 months ago
Streamroller: : automatic synthesis of prescribed throughput accelerator pipelines
In this paper, we present a methodology for designing a pipeline of accelerators for an application. The application is modeled using sequential C language with simple stylization...
Manjunath Kudlur, Kevin Fan, Scott A. Mahlke
134
Voted
IEEECIT
2006
IEEE
15 years 9 months ago
Information Coverage Configuration with Energy Preservation in Large Scale Wireless Sensor Networks
Coverage configuration is an important issue in large scale wireless sensor networks (WSNs). Existing coverage configuration methods are generally based on the concept of physical...
Hongxing Bai, Xi Chen, Yu-Chi Ho, Xiaohong Guan
« Prev « First page 2574 / 2769 Last » Next »