Sciweavers

4307 search results - page 275 / 862
» Dynamic Spyware Analysis
Sort
View
105
Voted
CCS
2009
ACM
15 years 4 months ago
Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks
Despite the many efforts made in recent years to mitigate runtime attacks such as stack and heap based buffer overflows, these attacks are still a common security concern in today...
Lucas Davi, Ahmad-Reza Sadeghi, Marcel Winandy
112
Voted
COMPLEX
2009
Springer
15 years 4 months ago
Capturing Internet Traffic Dynamics through Graph Distances
Studies of the Internet have typically focused either on the routing system, i.e. the paths chosen to reach a given destination, or on the evolution of traffic on a physical link. ...
Steve Uhlig, Bingjie Fu, Almerima Jamakovic
106
Voted
AMDO
2006
Springer
15 years 4 months ago
Carrying Object Detection Using Pose Preserving Dynamic Shape Models
In this paper, we introduce a framework for carrying object detection in different people from different views using pose preserving dynamic shape models. We model dynamic shape de...
Chan-Su Lee, Ahmed M. Elgammal
115
Voted
SPLC
2007
15 years 1 months ago
Scalability of Decision Models for Dynamic Product Lines
Product lines need decision models that guide the derivation of product variants satisfying specific requirements. In dynamic product lines, whose requirements vary during runtime...
Gunnar Brataas, Svein O. Hallsteinsen, Romain Rouv...
100
Voted
CONCURRENCY
2008
102views more  CONCURRENCY 2008»
15 years 27 days ago
Dynamic data replication in LCG 2008
To provide performant access to data from high energy physics experiments such as the Large Hadron Collider (LHC), controlled replication of files among grid sites is required. Dy...
Caitriana Nicholson, David G. Cameron, A. T. Doyle...