Sciweavers

2863 search results - page 468 / 573
» Constructing minimum-interference networks
Sort
View
RAID
2010
Springer
14 years 12 months ago
Hybrid Analysis and Control of Malware
Abstract. Malware attacks necessitate extensive forensic analysis efforts that are manual-labor intensive because of the analysis-resistance techniques that malware authors employ....
Kevin A. Roundy, Barton P. Miller
VTC
2010
IEEE
148views Communications» more  VTC 2010»
14 years 12 months ago
Delay-Tolerant Cooperative Diversity Routing MANET
—Some mobile ad hoc networks (MANETs) such as inter-vehicle communications require a transmission scheme that is robust to mobility and asynchronous reception with low setup over...
Tian Peng Ren, Yong Liang Guan, Chau Yuen, Rong Ju...
CODES
2010
IEEE
14 years 11 months ago
Exploring models of computation with ptolemy II
The Ptolemy project studies modeling, simulation, and design of concurrent, real-time, embedded systems. The focus is on assembly of concurrent components. The key underlying prin...
Christopher X. Brooks, Edward A. Lee, Stavros Trip...
149
Voted
MOBISYS
2008
ACM
16 years 1 months ago
Behavioral detection of malware on mobile handsets
A novel behavioral detection framework is proposed to detect mobile worms, viruses and Trojans, instead of the signature-based solutions currently available for use in mobile devi...
Abhijit Bose, Xin Hu, Kang G. Shin, Taejoon Park
EWSN
2010
Springer
15 years 10 months ago
Privacy-Preserving Reconstruction of Multidimensional Data Maps in Vehicular Participatory Sensing
The proliferation of sensors in devices of frequent use, such as mobile phones, offers unprecedented opportunities for forming selfselected communities around shared sensory data ...
Nam Pham, Raghu K. Ganti, Yusuf S. Uddin, Suman Na...