Sciweavers

1022 search results - page 175 / 205
» Challenges for Constraint Programming in Networking
Sort
View
NDSS
2009
IEEE
15 years 7 months ago
K-Tracer: A System for Extracting Kernel Malware Behavior
Kernel rootkits can provide user level-malware programs with the additional capabilities of hiding their malicious activities by altering the legitimate kernel behavior of an oper...
Andrea Lanzi, Monirul I. Sharif, Wenke Lee
114
Voted
IJCNN
2007
IEEE
15 years 6 months ago
DHP-Based Wide-Area Coordinating Control of a Power System with a Large Wind Farm and Multiple FACTS Devices
—Wide-area coordinating control is becoming an important issue and a challenging problem in the power industry. This paper proposes a novel optimal wide-area monitor and wide-are...
Wei Qiao, Ronald G. Harley, Ganesh K. Venayagamoor...
NCA
2006
IEEE
15 years 6 months ago
Parallelization of Geant4 Using TOP-C and Marshalgen
Geant4 is a very large, highly accurate toolkit for Monte Carlo simulation of particle-matter interaction. It has been applied to high-energy physics, cosmic ray modeling, radiati...
Gene Cooperman, Viet Ha Nguyen, Igor Malioutov
CORR
2010
Springer
151views Education» more  CORR 2010»
15 years 17 days ago
Behavioural Correlation for Detecting P2P Bots
In the past few years, IRC bots, malicious programs which are remotely controlled by the attacker through IRC servers, have become a major threat to the Internet and users. These ...
Yousof Al-Hammadi, Uwe Aickelin
125
Voted
CN
2007
154views more  CN 2007»
15 years 14 days ago
Disjoint multipath routing using colored trees
— Multipath routing (MPR) is an effective strategy to achieve robustness, load balancing, congestion reduction, and increased throughput in computer networks. Disjoint multipath ...
Srinivasan Ramasubramanian, Harish Krishnamoorthy,...