Sciweavers

3750 search results - page 564 / 750
» Code Optimization for Code Compression
Sort
View
IPCCC
2007
IEEE
15 years 9 months ago
Understanding Localized-Scanning Worms
— Localized scanning is a simple technique used by attackers to search for vulnerable hosts. Localized scanning trades off between the local and the global search of vulnerable h...
Zesheng Chen, Chao Chen, Chuanyi Ji
VTC
2007
IEEE
143views Communications» more  VTC 2007»
15 years 9 months ago
Ant-Colony-Based Multiuser Detection for MC DS-CDMA Systems
Abstract— In this contribution we present a novel ant colony optimization (ACO) based multi-user detector (MUD) designed for synchronous multi-carrier direct sequence code divisi...
Chong Xu, Lie-Liang Yang, Lajos Hanzo
102
Voted
CP
2007
Springer
15 years 9 months ago
A Case for Simple SAT Solvers
As SAT becomes more popular due to its ability to handle large real-world problems, progress in efficiency appears to have slowed down over the past few years. On the other hand, w...
Jinbo Huang
131
Voted
NPC
2007
Springer
15 years 9 months ago
Performance Prediction for Mappings of Distributed Applications on PC Clusters
Abstract. Distributed applications running on clusters may be composed of several components with very different performance requirements. The FlowVR middleware allows the develop...
Sylvain Jubertie, Emmanuel Melin
121
Voted
RAID
2007
Springer
15 years 9 months ago
Emulation-Based Detection of Non-self-contained Polymorphic Shellcode
Network-level emulation has recently been proposed as a method for the accurate detection of previously unknown polymorphic code injection attacks. In this paper, we extend network...
Michalis Polychronakis, Kostas G. Anagnostakis, Ev...