Sciweavers

2414 search results - page 280 / 483
» Computing Normal Subgroups
Sort
View
144
Voted
WWW
2010
ACM
15 years 9 months ago
Detection and analysis of drive-by-download attacks and malicious JavaScript code
JavaScript is a browser scripting language that allows developers to create sophisticated client-side interfaces for web applications. However, JavaScript code is also used to car...
Marco Cova, Christopher Krügel, Giovanni Vign...
121
Voted
AINA
2009
IEEE
15 years 9 months ago
Toward fMRI Group Identification Based on Brain Lateralization
— This research presents a novel application of Lateralization Index (LI) in support of a decision making process for the classification of subjects based on their brain activati...
Magno R. Guillen, Malek Adjouadi, Xiaozhen You, Ar...
140
Voted
IPPS
2009
IEEE
15 years 9 months ago
An upload bandwidth threshold for peer-to-peer Video-on-Demand scalability
We consider the fully distributed Video-on-Demand problem, where n nodes called boxes store a large set of videos and collaborate to serve simultaneously n videos or less between ...
Yacine Boufkhad, Fabien Mathieu, Fabien de Montgol...
TLCA
2009
Springer
15 years 9 months ago
A Logical Foundation for Environment Classifiers
Taha and Nielsen have developed a multi-stage calculus λα with a sound type system using the notion of environment classifiers. They are special identifiers, with which code fr...
Takeshi Tsukada, Atsushi Igarashi
NDSS
2006
IEEE
15 years 8 months ago
Enterprise Security: A Community of Interest Based Approach
Enterprise networks today carry a range of mission critical communications. A successful worm attack within an enterprise network can be substantially more devastating to most com...
Patrick Drew McDaniel, Subhabrata Sen, Oliver Spat...