Sciweavers

1285 search results - page 160 / 257
» Codes for Digital Recorders
Sort
View
SAC
2010
ACM
15 years 11 months ago
Botzilla: detecting the "phoning home" of malicious software
Hosts infected with malicious software, so called malware, are ubiquitous in today’s computer networks. The means whereby malware can infiltrate a network are manifold and rang...
Konrad Rieck, Guido Schwenk, Tobias Limmer, Thorst...
134
Voted
GLOBECOM
2009
IEEE
15 years 11 months ago
Rate Adaptation with NAK-Aided Loss Differentiation in 802.11 Wireless Networks
—The Physical Layer of the IEEE 802.11 standard family provides a set of different modulation and coding schemes and, thus, a multitude of data rates. However, the Standard itsel...
Anne N. Ngugi, Yuanzhu Peter Chen, Qing Li
WCRE
2009
IEEE
15 years 11 months ago
NTrace: Function Boundary Tracing for Windows on IA-32
—For a long time, dynamic tracing has been an enabling technique for reverse engineering tools. Tracing can not only be used to record the control flow of a particular component...
Johannes Passing, Alexander Schmidt, Martin von L&...
IEEEIAS
2009
IEEE
15 years 11 months ago
Implementation of an Electronic Voting System with Contactless IC Cards for Small-Scale Voting
—There have been several studies on using computer technologies to improve elections and these studies lead to widespread adoption of “direct recording electronic” (DRE) voti...
Chung-Huang Yang, Shih-Yi Tu, Pei-Hua Yen
146
Voted
ICSM
2007
IEEE
15 years 11 months ago
Release Pattern Discovery: A Case Study of Database Systems
Studying the release-time activities of a software project — that is, activities that occur around the time of a major or minor release — can provide insights into both the de...
Abram Hindle, Michael W. Godfrey, Richard C. Holt