Sciweavers

4307 search results - page 788 / 862
» Dynamic Spyware Analysis
Sort
View
MOBIHOC
2002
ACM
16 years 3 months ago
Comparison of broadcasting techniques for mobile ad hoc networks
Network wide broadcasting in Mobile Ad Hoc Networks provides important control and route establishment functionality for a number of unicast and multicast protocols. Considering i...
Brad Williams, Tracy Camp
159
Voted
ESORICS
2009
Springer
15 years 11 months ago
Privacy Preserving Publication of Moving Object Data
The increasing availability of space-time trajectories left by location-aware devices is expected to enable novel classes of applications where the discovery of consumable, concise...
Francesco Bonchi
NDSS
2009
IEEE
15 years 11 months ago
Scalable, Behavior-Based Malware Clustering
Anti-malware companies receive thousands of malware samples every day. To process this large quantity, a number of automated analysis tools were developed. These tools execute a m...
Ulrich Bayer, Paolo Milani Comparetti, Clemens Hla...
ICIAR
2009
Springer
15 years 10 months ago
Image and Video Retargetting by Darting
This paper considers the problem of altering an image by imperceptibly adding or removing pixels, for example, to fit a differently shaped frame with minimal loss of interesting ...
Matthew Brand
GLOBECOM
2008
IEEE
15 years 10 months ago
Distributed Spectrum Allocation of Delay-Sensitive Users over Multi-User Multi-Carrier Networks
—In this paper, we study the distributed spectrum allocation for autonomous users transmitting delay-sensitive information over a wireless multi-carrier network. Because there is...
Wenchi Tu, Mihaela van der Schaar