Sciweavers

3456 search results - page 83 / 692
» Byte Code Engineering
Sort
View
KDD
2004
ACM
330views Data Mining» more  KDD 2004»
16 years 2 months ago
Learning to detect malicious executables in the wild
In this paper, we describe the development of a fielded application for detecting malicious executables in the wild. We gathered 1971 benign and 1651 malicious executables and enc...
Jeremy Z. Kolter, Marcus A. Maloof
OSDI
2008
ACM
16 years 2 months ago
Quanto: Tracking Energy in Networked Embedded Systems
We present Quanto, a network-wide time and energy profiler for embedded network devices. By combining well-defined interfaces for hardware power states, fast high-resolution energ...
Rodrigo Fonseca, Prabal Dutta, Philip Levis, Ion S...
CCS
2009
ACM
15 years 9 months ago
HAIL: a high-availability and integrity layer for cloud storage
We introduce HAIL (High-Availability and Integrity Layer), a distributed cryptographic system that allows a set of servers to prove to a client that a stored file is intact and r...
Kevin D. Bowers, Ari Juels, Alina Oprea
SENSYS
2006
ACM
15 years 8 months ago
Protothreads: simplifying event-driven programming of memory-constrained embedded systems
Event-driven programming is a popular model for writing programs for tiny embedded systems and sensor network nodes. While event-driven programming can keep the memory overhead do...
Adam Dunkels, Oliver Schmidt, Thiemo Voigt, Muneeb...
HIPEAC
2005
Springer
15 years 7 months ago
Garbage Collection Hints
This paper shows that Appel-style garbage collectors often make suboptimal decisions both in terms of when and how to collect. We argue that garbage collection should be done when ...
Dries Buytaert, Kris Venstermans, Lieven Eeckhout,...