Sciweavers

4307 search results - page 549 / 862
» Dynamic Spyware Analysis
Sort
View
HICSS
2007
IEEE
129views Biometrics» more  HICSS 2007»
15 years 10 months ago
The Impact of Negative Relations on Performance and Satisfaction in Group Work
This paper reports on a case study conducted to guide the design and implementation of a group support system. Network analysis of student self-reported interactions was conducted...
Ling Xia, N. Sadat Shami, Y. Connie Yuan, Geri Gay
ICDAR
2007
IEEE
15 years 10 months ago
An Efficient Word Segmentation Technique for Historical and Degraded Machine-Printed Documents
Word segmentation is a crucial step for segmentation-free document analysis systems and is used for creating an index based on word matching. In this paper, we propose a novel met...
Michael Makridis, N. Nikolaou, Basilios Gatos
ISQED
2007
IEEE
125views Hardware» more  ISQED 2007»
15 years 10 months ago
Modeling of PMOS NBTI Effect Considering Temperature Variation
Negative bias temperature instability (NBTI) has come to the forefront of critical reliability phenomena in advanced CMOS technology. In this paper, we propose a fast and accurate...
Hong Luo, Yu Wang 0002, Ku He, Rong Luo, Huazhong ...
ISVLSI
2007
IEEE
232views VLSI» more  ISVLSI 2007»
15 years 10 months ago
DSPstone Benchmark of CoDeL's Automated Clock Gating Platform
— We present a performance analysis of CoDeL, a highly efficient automated clock gating platform for rapidly developing power efficient hardware architectures. It automatically...
Nainesh Agarwal, Nikitas J. Dimopoulos
RAID
2007
Springer
15 years 10 months ago
Exploiting Execution Context for the Detection of Anomalous System Calls
Attacks against privileged applications can be detected by analyzing the stream of system calls issued during process execution. In the last few years, several approaches have been...
Darren Mutz, William K. Robertson, Giovanni Vigna,...