Sciweavers

1012 search results - page 152 / 203
» Identification of System Software Components Using Clusterin...
Sort
View
USS
2008
15 years 4 months ago
CloudAV: N-Version Antivirus in the Network Cloud
Antivirus software is one of the most widely used tools for detecting and stopping malicious and unwanted files. However, the long term effectiveness of traditional hostbased anti...
Jon Oberheide, Evan Cooke, Farnam Jahanian
HICSS
2009
IEEE
119views Biometrics» more  HICSS 2009»
15 years 9 months ago
Using Graphics Processors for Parallelizing Hash-Based Data Carving
The ability to detect fragments of deleted image files and to reconstruct these image files from all available fragments on disk is a key activity in the field of digital forensic...
Sylvain Collange, Yoginder S. Dandass, Marc Daumas...
PROMAS
2005
Springer
15 years 7 months ago
Organization and Mobility in Mobile Agent Computing
Abstract. A mobile agent system for organizing multiple mobile agents is presented. It provides two unique two mechanisms for dynamically organizing mobile agents, which may be run...
Ichiro Satoh
ECSA
2011
Springer
14 years 2 months ago
Architecture-Based Run-Time Fault Diagnosis
Abstract. An important step in achieving robustness to run-time faults is the ability to detect and repair problems when they arise in a running system. Effective fault detection a...
Paulo Casanova, Bradley R. Schmerl, David Garlan, ...
ICECCS
1999
IEEE
88views Hardware» more  ICECCS 1999»
15 years 6 months ago
UML + ROOM as a Standard ADL?
Designing a software system's architecture properly is one of the most important tasks of any software engineering project. Nevertheless there exists no common definition of ...
Bernhard Rumpe, M. Schoenmakers, Ansgar Radermache...