Sciweavers

1395 search results - page 250 / 279
» Incremental Construction Approach for Distributed System Spe...
Sort
View
CCS
2008
ACM
14 years 11 months ago
Ether: malware analysis via hardware virtualization extensions
Malware has become the centerpiece of most security threats on the Internet. Malware analysis is an essential technology that extracts the runtime behavior of malware, and supplie...
Artem Dinaburg, Paul Royal, Monirul I. Sharif, Wen...

Book
273views
16 years 7 months ago
Designing and Building Parallel Program
"Designing and Building Parallel Programs is a book for students and professionals who need to know how to write parallel programs. It is neither a programming language manual...
Ian Foster
WEBI
2004
Springer
15 years 3 months ago
An Access Control Model for Web Services in Business Process
Business process describes a set of services that span enterprise boundaries and are provided by enterprises that see each other as partners. Web services is widely accepted and a...
Peng Liu, Zhong Chen
91
Voted
ICRA
2002
IEEE
167views Robotics» more  ICRA 2002»
15 years 2 months ago
Coordinated Teams of Reactive Mobile Platforms
This paper presents techniques for exploiting redundancy in teams of mobile robots. In particular, we address tasks involving the kinematic coordination of several communicating r...
John Sweeney, T. J. Brunette, Yunlei Yang, Roderic...
ITCC
2002
IEEE
15 years 2 months ago
Bridging O-Telos and XML with XML Schema: the Authoring Environment for KBS Adaptive Hyperbook
KBS Adaptive Hyperbook is a framework designed for modeling, organizing, and maintaining distributed hypermedia resources on the Web with the purpose of supporting Web-based dista...
Changtao Qu, Wolfgang Nejdl