Sciweavers

2015 search results - page 352 / 403
» Hidden Software Capabilities
Sort
View
120
Voted
BIS
2010
159views Business» more  BIS 2010»
14 years 7 months ago
Comparing Intended and Real Usage in Web Portal: Temporal Logic and Data Mining
Nowadays the software systems, including web portals, are developed from a priori assumptions about how the system will be used. However, frequently these assumptions hold only par...
Jérémy Besson, Ieva Mitasiunaite, Au...
DASIP
2010
14 years 7 months ago
RVC: A multi-decoder CAL Composer tool
The Reconfigurable Video Coding (RVC) framework is a recent ISO standard aiming at providing a unified specification of MPEG video technology in the form of a library of component...
Francesca Palumbo, Danilo Pani, Emanuele Manca, Lu...
111
Voted
SIMULATION
2010
178views more  SIMULATION 2010»
14 years 7 months ago
Application-level Simulation for Network Security
We introduce and describe a novel network simulation tool called NeSSi (Network Security Simulator). NeSSi incorporates a variety of features relevant to network security distingu...
Stephan Schmidt, Rainer Bye, Joël Chinnow, Ka...
ICASSP
2011
IEEE
14 years 4 months ago
WinDSK8: A user interface for the OMAP-L138 DSP board
A new multi-core DSP board is available for university and industry engineers. The LogicPD ZoomTM OMAP-L138 eXperimenter Kit, featuring Texas Instruments’ dual core SoC (ARM9 an...
Michael G. Morrow, Cameron H. G. Wright, Thad B. W...
JCS
2011
138views more  JCS 2011»
14 years 3 months ago
Automatic analysis of malware behavior using machine learning
Malicious software—so called malware—poses a major threat to the security of computer systems. The amount and diversity of its variants render classic security defenses ineffe...
Konrad Rieck, Philipp Trinius, Carsten Willems, Th...