Sciweavers

4307 search results - page 575 / 862
» Dynamic Spyware Analysis
Sort
View
197
Voted
VISUALIZATION
1995
IEEE
15 years 7 months ago
Virtual GIS: A Real-Time 3D Geographic Information System
Advances in computer graphics hardware and algorithms, visualization, and interactive techniques for analysis offer the components for a highly integrated, efficient real-time 3D ...
David Koller, Peter Lindstrom, William Ribarsky, L...
NSDI
2007
15 years 6 months ago
Ensuring Content Integrity for Untrusted Peer-to-Peer Content Distribution Networks
Many existing peer-to-peer content distribution networks (CDNs) such as Na Kika, CoralCDN, and CoDeeN are deployed on PlanetLab, a relatively trusted environment. But scaling them...
Nikolaos Michalakis, Robert Soulé, Robert G...
123
Voted
DAC
2005
ACM
15 years 5 months ago
Smart diagnostics for configurable processor verification
This paper describes a novel technique called Embedded Test-bench Control (ETC), extensively used in the verification of Tensilica’s latest configurable processor. Conventional ...
Sadik Ezer, Scott Johnson
DIMVA
2007
15 years 5 months ago
A Study of Malcode-Bearing Documents
By exploiting the object-oriented dynamic composability of modern document applications and formats, malcode hidden in otherwise inconspicuous documents can reach third-party appli...
Wei-Jen Li, Salvatore J. Stolfo, Angelos Stavrou, ...
102
Voted
MEDINFO
2007
115views Healthcare» more  MEDINFO 2007»
15 years 5 months ago
Using an Accident Model to Design Safe Electronic Medication Management Systems
Large-scale implementation of electronic prescribing systems (e-PS) is likely to introduce at least some machinerelated errors that will harm patients. We present a dynamic system...
Farah Magrabi, Geoff McDonnell, Johanna I. Westbro...