Sciweavers

1889 search results - page 362 / 378
» Evaluating cost taxonomies for information systems managemen...
Sort
View
SIGCOMM
2010
ACM
14 years 10 months ago
On the forwarding capability of mobile handhelds for video streaming over MANETs
Despite the importance of real-world experiments, nearly all ongoing research activities addressing video streaming over MANETs are based on simulation studies. Earlier research s...
Stein Kristiansen, Morten Lindeberg, Daniel Rodr&i...
BMCBI
2010
98views more  BMCBI 2010»
14 years 9 months ago
Resolving anaphoras for the extraction of drug-drug interactions in pharmacological documents
Background: Drug-drug interactions are frequently reported in the increasing amount of biomedical literature. Information Extraction (IE) techniques have been devised as a useful ...
Isabel Segura-Bedmar, Mario Crespo, César d...
PPDP
2010
Springer
14 years 8 months ago
Graph queries through datalog optimizations
This paperdescribes the use of a powerful graph query language for querying programs, and a novel combination of transformations for generating efficient implementations of the q...
K. Tuncay Tekle, Michael Gorbovitski, Yanhong A. L...
ACSAC
2009
IEEE
15 years 4 months ago
MAVMM: Lightweight and Purpose Built VMM for Malware Analysis
—Malicious software is rampant on the Internet and costs billions of dollars each year. Safe and thorough analysis of malware is key to protecting vulnerable systems and cleaning...
Anh M. Nguyen, Nabil Schear, HeeDong Jung, Apeksha...
VEE
2006
ACM
106views Virtualization» more  VEE 2006»
15 years 3 months ago
Using VMM-based sensors to monitor honeypots
Virtual Machine Monitors (VMMs) are a common tool for implementing honeypots. In this paper we examine the implementation of a VMM-based intrusion detection and monitoring system ...
Kurniadi Asrigo, Lionel Litty, David Lie