Sciweavers

6846 search results - page 1230 / 1370
» Developing an Active Observer
Sort
View
96
Voted
SECON
2007
IEEE
15 years 7 months ago
Fairness and Physical Layer Capture in Random Access Networks
Abstract— While physical layer capture has been observed in real implementations of wireless devices which randomly accessing shared channels, fair rate control algorithms based ...
Hoon Chang, Vishal Misra, Dan Rubenstein
129
Voted
SP
2007
IEEE
135views Security Privacy» more  SP 2007»
15 years 7 months ago
Exploring Multiple Execution Paths for Malware Analysis
Malicious code (or malware) is defined as software that fulfills the deliberately harmful intent of an attacker. Malware analysis is the process of determining the behavior and ...
Andreas Moser, Christopher Krügel, Engin Kird...
112
Voted
ICC
2007
IEEE
161views Communications» more  ICC 2007»
15 years 7 months ago
Optimizing Multiplayer Gaming Protocols for Heterogeneous Network Environment
— The paper is concerned with a novel adaptive game server protocol optimization to combat network latencies in the case of heterogeneous network environment. In this way, game p...
Zsolt Kenesi, Gábor Kiss, János Leve...
103
Voted
CAEPIA
2007
Springer
15 years 7 months ago
Fast and Informed Action Selection for Planning with Sensing
Consider a robot whose task is to pick up some colored balls from a grid, taking the red balls to a red spot, the blue balls to a blue spot and so on, one by one, without knowing e...
Alexandre Albore, Héctor Palacios, Hector G...
CCS
2007
ACM
15 years 7 months ago
Predicting vulnerable software components
Where do most vulnerabilities occur in software? Our Vulture tool automatically mines existing vulnerability databases and version archives to map past vulnerabilities to componen...
Stephan Neuhaus, Thomas Zimmermann, Christian Holl...
« Prev « First page 1230 / 1370 Last » Next »