Sciweavers

4109 search results - page 728 / 822
» Issues in Design and Implementation of Multimedia Software S...
Sort
View
RAID
2010
Springer
14 years 7 months ago
BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection
We introduce BotSwindler, a bait injection system designed to delude and detect crimeware by forcing it to reveal during the exploitation of monitored information. The implementati...
Brian M. Bowen, Pratap V. Prabhu, Vasileios P. Kem...
VLSI
2010
Springer
14 years 4 months ago
SESAM extension for fast MPSoC architectural exploration and dynamic streaming applications
Future systems will have to support multiple and concurrent dynamic compute-intensive applications, while respecting real-time and energy consumption constraints. To overcome these...
Nicolas Ventroux, Tanguy Sassolas, Raphael David, ...
MICRO
2008
IEEE
126views Hardware» more  MICRO 2008»
14 years 9 months ago
Multicore Resource Management
UAL PRIVATE MACHINE ABSTRACTION WOULD ALLOW SOFTWARE POLICIES TO EXPLICITLY MANAGE MICROARCHITECTURE RESOURCES. VPM POLICIES, IMPLEMENTED PRIMARILY IN SOFTWARE, TRANSLATE APPLICATI...
Kyle J. Nesbit, Miquel Moretó, Francisco J....
DIGITEL
2008
IEEE
15 years 4 months ago
Games as Skins for Online Tests
: Games play a dual role: they test the player’s competence, and at the same time provide learning opportunities. They offer a simple form of a reward – the pleasure of playing...
Srinivasan Ramani, Venkatagiri Sirigiri, Nila Lohi...
WSC
1998
14 years 11 months ago
Applying Temporal Databases to HLA Data Collection and Analysis
The High Level Architecture (HLA) for distributed simulations was proposed by the Defense Modeling and Simulation Office of the Department of Defense (DOD) in order to support int...
Thom McLean, Leo Mark, Margaret L. Loper, David Ro...