Sciweavers

617 search results - page 84 / 124
» Debugging distributed programs using controlled re-execution
Sort
View
ISSTA
2004
ACM
15 years 7 months ago
Testing malware detectors
In today’s interconnected world, malware, such as worms and viruses, can cause havoc. A malware detector (commonly known as virus scanner) attempts to identify malware. In spite...
Mihai Christodorescu, Somesh Jha
ATAL
2005
Springer
15 years 7 months ago
Experiences with the design and implementation of an agent-based autonomous UAV controller
This paper reports experiences and outcomes of designing and developing an agent–based, autonomous mission control system for an unmanned aerial vehicle (UAV). Most UAVs are not...
Samin Karim, Clinton Heinze
AUSAI
2003
Springer
15 years 7 months ago
Efficiently Mining Frequent Patterns from Dense Datasets Using a Cluster of Computers
Efficient mining of frequent patterns from large databases has been an active area of research since it is the most expensive step in association rules mining. In this paper, we pr...
Yudho Giri Sucahyo, Raj P. Gopalan, Amit Rudra
IPSN
2007
Springer
15 years 8 months ago
Exact distributed Voronoi cell computation in sensor networks
Distributed computation of Voronoi cells in sensor networks, i.e. computing the locus of points in a sensor field closest to a given sensor, is a key building block that supports...
Boulat A. Bash, Peter Desnoyers
NSPW
2003
ACM
15 years 7 months ago
SELF: a transparent security extension for ELF binaries
The ability to analyze and modify binaries is often very useful from a security viewpoint. Security operations one would like to perform on binaries include the ability to extract...
Daniel C. DuVarney, V. N. Venkatakrishnan, Sandeep...