Sciweavers

6960 search results - page 1241 / 1392
» Continuity Analysis of Programs
Sort
View
IEEEARES
2009
IEEE
15 years 10 months ago
A Framework for Understanding Botnets
Botnets have become a severe threat to the cyberspace. However, existing studies are typically conducted in an ad hoc fashion, by demonstrating specific analysis on captured bot ...
Justin Leonard, Shouhuai Xu, Ravi S. Sandhu
IEEEARES
2009
IEEE
15 years 10 months ago
Investigating the Implications of Virtual Machine Introspection for Digital Forensics
— Researchers and practitioners in computer forensics currently must base their analysis on information that is either incomplete or produced by tools that may themselves be comp...
Kara L. Nance, Brian Hay, Matt Bishop
PDP
2009
IEEE
15 years 10 months ago
PsycoTrace: Virtual and Transparent Monitoring of a Process Self
PsycoTrace is a set of tools to protect a process P from attacks that alter P self as specified by its source code. P self is specified in terms of legal traces of system calls ...
Fabrizio Baiardi, Dario Maggiari, Daniele Sgandurr...
AOSD
2009
ACM
15 years 10 months ago
Expressive scoping of distributed aspects
Dynamic deployment of aspects brings greater flexibility and reuse potential, but requires proper means for scoping aspects. Scoping issues are particularly crucial in a distribu...
Éric Tanter, Johan Fabry, Rémi Douen...
SC
2009
ACM
15 years 10 months ago
Dynamic task scheduling for linear algebra algorithms on distributed-memory multicore systems
This paper presents a dynamic task scheduling approach to executing dense linear algebra algorithms on multicore systems (either shared-memory or distributed-memory). We use a tas...
Fengguang Song, Asim YarKhan, Jack Dongarra
« Prev « First page 1241 / 1392 Last » Next »