Sciweavers

92 search results - page 13 / 19
» Design space and analysis of worm defense strategies
Sort
View
ECRTS
2009
IEEE
14 years 7 months ago
Precise Worst-Case Execution Time Analysis for Processors with Timing Anomalies
This paper explores timing anomalies in WCET analysis. Timing anomalies add to the complexity of WCET analysis and make it hard to apply divide-and-conquer strategies to simplify ...
Raimund Kirner, Albrecht Kadlec, Peter P. Puschner
PVLDB
2010
86views more  PVLDB 2010»
14 years 8 months ago
Swarm: Mining Relaxed Temporal Moving Object Clusters
Recent improvements in positioning technology make massive moving object data widely available. One important analysis is to find the moving objects that travel together. Existin...
Zhenhui Li, Bolin Ding, Jiawei Han, Roland Kays
CORR
2010
Springer
99views Education» more  CORR 2010»
14 years 9 months ago
MIMO Identical Eigenmode Transmission System (IETS) - A Channel Decomposition Perspective
In the past few years considerable attention has been given to the design of multiple-input multiple-output (MIMO) eigenmode transmission systems (EMTS). This paper presents an in...
M. Zeeshan Shakir, Tariq S. Durrani
HICSS
2007
IEEE
86views Biometrics» more  HICSS 2007»
15 years 4 months ago
Digital Consumer Networks and Producer-Consumer Collaboration: Innovation and Product Development in the Digital Entertainment I
This paper examines new forms of collaboration between producers and consumers that are emerging in the digital entertainment space. Taking the case of the video-game industry, we...
Reina Y. Arakji, Karl Reiner Lang
81
Voted
CCS
2009
ACM
15 years 10 months ago
Automating analysis of large-scale botnet probing events
Botnets dominate today's attack landscape. In this work we investigate ways to analyze collections of malicious probing traffic in order to understand the significance of lar...
Zhichun Li, Anup Goyal, Yan Chen, Vern Paxson