Sciweavers

4285 search results - page 686 / 857
» Differential Behavioral Analysis
Sort
View
RAID
2010
Springer
15 years 3 months ago
Detecting the Onset of Infection for Secure Hosts
Abstract. Software flaws in applications such as a browser may be exploited by attackers to launch drive-by-download (DBD), which has become the major vector of malware infection....
Kui Xu, Qiang Ma, Danfeng (Daphne) Yao
SAT
2010
Springer
165views Hardware» more  SAT 2010»
15 years 3 months ago
An Empirical Study of Optimal Noise and Runtime Distributions in Local Search
This paper presents a detailed empirical study of local search for Boolean satisfiability (SAT), highlighting several interesting properties, some of which were previously unknown...
Lukas Kroc, Ashish Sabharwal, Bart Selman
TASLP
2010
127views more  TASLP 2010»
15 years 3 months ago
New Insights Into the MVDR Beamformer in Room Acoustics
—The minimum variance distortionless response (MVDR) beamformer, also known as Capon’s beamformer, is widely studied in the area of speech enhancement. The MVDR beamformer can ...
Emanuël Anco Peter Habets, Jacob Benesty, Isr...
TMC
2010
112views more  TMC 2010»
15 years 3 months ago
Comparison of Data-Driven Link Estimation Methods in Low-Power Wireless Networks
Abstract—Link estimation is a basic element of routing in lowpower wireless networks, and data-driven link estimation using unicast MAC feedback has been shown to outperform broa...
Hongwei Zhang, Lifeng Sang, Anish Arora
GLOBECOM
2010
IEEE
15 years 3 months ago
Trust Management for Encounter-Based Routing in Delay Tolerant Networks
: We propose and analyze a class of trust management protocols for encounter-based routing in delay tolerant networks (DTNs). The underlying idea is to incorporate trust evaluation...
Ing-Ray Chen, Fenye Bao, Moonjeong Chang, Jin-Hee ...