Sciweavers

347 search results - page 49 / 70
» Dynamic Analysis Techniques for the Reconstruction of Archit...
Sort
View
IEEEARES
2006
IEEE
15 years 7 months ago
Replication Strategies for Reliable Decentralised Storage
Distributed hash tables (DHTs) can be used as the basis of a resilient lookup service in unstable environments: local routing tables are updated to reflected changes in the netwo...
Matthew Leslie, Jim Davies, Todd Huffman
113
Voted
JNW
2006
145views more  JNW 2006»
15 years 1 months ago
A Comparison of Replication Strategies for Reliable Decentralised Storage
Distributed hash tables (DHTs) can be used as the basis of a resilient lookup service in unstable environments: local routing tables are updated to reflected changes in the network...
Matthew Leslie, Jim Davies, Todd Huffman
SP
2007
IEEE
135views Security Privacy» more  SP 2007»
15 years 7 months ago
Exploring Multiple Execution Paths for Malware Analysis
Malicious code (or malware) is defined as software that fulfills the deliberately harmful intent of an attacker. Malware analysis is the process of determining the behavior and ...
Andreas Moser, Christopher Krügel, Engin Kird...
MICRO
1994
IEEE
118views Hardware» more  MICRO 1994»
15 years 5 months ago
Characterizing the impact of predicated execution on branch prediction
Branch instructions are recognized as a major impediment to exploiting instruction level parallelism. Even with sophisticated branch prediction techniques, many frequently execute...
Scott A. Mahlke, Richard E. Hank, Roger A. Bringma...
TOG
2008
293views more  TOG 2008»
15 years 1 months ago
A perceptually validated model for surface depth hallucination
Capturing detailed surface geometry currently requires specialized equipment such as laser range scanners, which despite their high accuracy, leave gaps in the surfaces that must ...
Mashhuda Glencross, Gregory J. Ward, Francho Melen...