Sciweavers

4307 search results - page 448 / 862
» Dynamic Spyware Analysis
Sort
View
ICPR
2000
IEEE
16 years 6 months ago
Nanometer-Scale Height Measurements in Micromachined Picoliter Vials Based on Interference Fringe Analysis
Micromachined picoliter vials in silicon dioxide with a typical depth of 6.0?m are filled with a liquid sample. Epiilluminated microscopic imaging during evaporation of the liquid...
L. R. Van den Doel, Lucas J. van Vliet, K. T. Hjel...
WWW
2010
ACM
15 years 11 months ago
Measurement and analysis of an online content voting network: a case study of Digg
In online content voting networks, aggregate user activities (e.g., submitting and rating content) make high-quality content thrive through the unprecedented scale, high dynamics ...
Yingwu Zhu
LCTRTS
2010
Springer
15 years 11 months ago
Analysis and approximation for bank selection instruction minimization on partitioned memory architecture
A large number of embedded systems include 8-bit microcontrollers for their energy efficiency and low cost. Multi-bank memory architecture is commonly applied in 8-bit microcontr...
Minming Li, Chun Jason Xue, Tiantian Liu, Yingchao...
P2P
2009
IEEE
115views Communications» more  P2P 2009»
15 years 11 months ago
Modeling and Analysis of Bandwidth-Inhomogeneous Swarms in BitTorrent
—A number of analytical models exists that capture various properties of the BitTorrent protocol. However, until now virtually all of these models have been based on the assumpti...
Michel Meulpolder, Johan A. Pouwelse, Dick H. J. E...
GECCO
2009
Springer
138views Optimization» more  GECCO 2009»
15 years 11 months ago
IMAD: in-execution malware analysis and detection
The sophistication of computer malware is becoming a serious threat to the information technology infrastructure, which is the backbone of modern e-commerce systems. We, therefore...
Syed Bilal Mehdi, Ajay Kumar Tanwani, Muddassar Fa...