Sciweavers

4307 search results - page 569 / 862
» Dynamic Spyware Analysis
Sort
View
HICSS
2005
IEEE
145views Biometrics» more  HICSS 2005»
15 years 9 months ago
Risk Assessment in Complex Interacting Infrastructure Systems
Critical infrastructures have some of the characteristic properties of complex systems. They exhibit infrequent large failures events. These events, though infrequent, often obey ...
David E. Newman, Bertrand Nkei, Benjamin A. Carrer...
HICSS
2005
IEEE
173views Biometrics» more  HICSS 2005»
15 years 9 months ago
Implementing Rule-Based Monitors within a Framework for Continuous Requirements Monitoring
With the increasing complexity of information systems, it is becoming increasingly unclear as to how information system behaviors relate to stated requirements. Although requireme...
William N. Robinson
111
Voted
HPDC
2005
IEEE
15 years 9 months ago
Interest-aware information dissemination in small-world communities
Information dissemination is a fundamental and frequently occuring problem in large, dynamic, distributed systems. We propose a novel approach to this problem, interest-aware info...
Adriana Iamnitchi, Ian T. Foster
ICMCS
2005
IEEE
113views Multimedia» more  ICMCS 2005»
15 years 9 months ago
Network-Adaptive Frame-Expansion-Based Packet Video Coding for Erasure Channels
This paper proposes a novel error-resilient packet video coding method which is designed to operate on unreliable IP networks suffering from large bursts of packet losses. The mai...
Andrew G. Backhouse, Irene Y. H. Gu
ISCA
2005
IEEE
118views Hardware» more  ISCA 2005»
15 years 9 months ago
Continuous Optimization
This paper presents a hardware-based dynamic optimizer that continuously optimizes an application’s instruction stream. In continuous optimization, dataflow optimizations are p...
Brian Fahs, Todd M. Rafacz, Sanjay J. Patel, Steve...