Sciweavers

2726 search results - page 432 / 546
» Application security support in the operating system kernel
Sort
View
SIGSOFT
2007
ACM
16 years 5 months ago
Mining specifications of malicious behavior
Malware detectors require a specification of malicious behavior. Typically, these specifications are manually constructed by investigating known malware. We present an automatic t...
Mihai Christodorescu, Somesh Jha, Christopher Krue...
143
Voted
PLDI
2011
ACM
14 years 7 months ago
Language-independent sandboxing of just-in-time compilation and self-modifying code
When dealing with dynamic, untrusted content, such as on the Web, software behavior must be sandboxed, typically through use of a language like JavaScript. However, even for such ...
Jason Ansel, Petr Marchenko, Úlfar Erlingss...
SIGMOD
2003
ACM
163views Database» more  SIGMOD 2003»
16 years 5 months ago
Multi-Dimensional Clustering: A New Data Layout Scheme in DB2
We describe the design and implementation of a new data layout scheme, called multi-dimensional clustering, in DB2 Universal Database Version 8. Many applications, e.g., OLAP and ...
Sriram Padmanabhan, Bishwaranjan Bhattacharjee, Ti...
APNOMS
2006
Springer
15 years 8 months ago
Experiences in End-to-End Performance Monitoring on KOREN
As the network technology has been developed, the Next Generation Internet (NGI) such as Internet2, KOREN, KREONET2 and etc has been deployed to support bandwidth of Giga bps. And,...
Wang-Cheol Song, Deok-Jae Choi
USENIX
2007
15 years 7 months ago
A Comparison of Structured and Unstructured P2P Approaches to Heterogeneous Random Peer Selection
Random peer selection is used by numerous P2P applications; examples include application-level multicast, unstructured file sharing, and network location mapping. In most of thes...
Vivek Vishnumurthy, Paul Francis