Sciweavers

3604 search results - page 544 / 721
» All Common Subsequences
Sort
View
ACNS
2009
Springer
157views Cryptology» more  ACNS 2009»
15 years 11 months ago
Malyzer: Defeating Anti-detection for Application-Level Malware Analysis
Abstract. Malware analysis is critical for malware detection and prevention. To defeat malware analysis and detection, today malware commonly adopts various sophisticated anti-dete...
Lei Liu, Songqing Chen
138
Voted
DAMON
2009
Springer
15 years 11 months ago
Cache-conscious buffering for database operators with state
Database processes must be cache-efficient to effectively utilize modern hardware. In this paper, we analyze the importance of temporal locality and the resultant cache behavior ...
John Cieslewicz, William Mee, Kenneth A. Ross
SIGCOMM
2009
ACM
15 years 11 months ago
Why should we integrate services, servers, and networking in a data center?
Since the early days of networks, a basic principle has been that endpoints treat the network as a black box. An endpoint injects a packet with a destination address and the netwo...
Paolo Costa, Thomas Zahn, Antony I. T. Rowstron, G...
142
Voted
SIGECOM
2009
ACM
111views ECommerce» more  SIGECOM 2009»
15 years 11 months ago
A qualitative vickrey auction
Restricting the preferences of the agents by assuming that their utility functions linearly depend on a payment allows for the positive results of the Vickrey auction and the Vick...
Paul Harrenstein, Mathijs de Weerdt, Vincent Conit...
143
Voted
ISBI
2007
IEEE
15 years 11 months ago
Validation of Optical-Flow for Quantification of Myocardial Deformations on Simulated Rt3d Ultrasound
Quantitative analysis of cardiac motion is of great clinical interest in assessing ventricular function. Real-time 3-D (RT3D) ultrasound transducers provide valuable fourdimension...
Qi Duan, Elsa D. Angelini, Shunichi Homma, Andrew ...