Sciweavers

3604 search results - page 669 / 721
» All Common Subsequences
Sort
View
ICMCS
2010
IEEE
178views Multimedia» more  ICMCS 2010»
15 years 27 days ago
Channel smurfing: Minimising channel switching delay in IPTV distribution networks
One of the major concerns of IPTV network deployment is channel switching (or zapping) delay. This delay can add up to two seconds or more, and its main culprits are synchronisati...
Fernando M. V. Ramos, Jon Crowcroft, Richard J. Gi...
MOBICOM
2010
ACM
15 years 1 days ago
SMS-based web search for low-end mobile devices
Short Messaging Service (SMS) based mobile information services have become increasingly common around the world, especially in emerging regions among users with low-end mobile de...
Jay Chen, Lakshminarayanan Subramanian, Eric A. Br...
CCS
2010
ACM
15 years 1 days ago
HyperSentry: enabling stealthy in-context measurement of hypervisor integrity
This paper presents HyperSentry, a novel framework to enable integrity measurement of a running hypervisor (or any other highest privileged software layer on a system). Unlike exi...
Ahmed M. Azab, Peng Ning, Zhi Wang, Xuxian Jiang, ...
RECSYS
2010
ACM
15 years 1 days ago
Affiliation recommendation using auxiliary networks
Social network analysis has attracted increasing attention in recent years. In many social networks, besides friendship links amongst users, the phenomenon of users associating th...
Vishvas Vasuki, Nagarajan Natarajan, Zhengdong Lu,...
CCS
2010
ACM
15 years 1 days ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...