Sciweavers

4263 search results - page 782 / 853
» Learning without Coding
Sort
View
EUC
2008
Springer
15 years 3 months ago
A Lightweight Detection and Recovery Infrastructure of Kernel Objects for Embedded Systems
The kernel objects consist of critical kernel data structures and system call functions, which are the most important data for a system, should be protected as first-class candida...
Lei Sun, Tatsuo Nakajima
IMC
2007
ACM
15 years 3 months ago
Compressed network monitoring for ip and all-optical networks
We address the problem of efficient end-to-end network monitoring of path metrics in communication networks. Our goal is to minimize the number of measurements or monitors requir...
Mark Coates, Yvan Pointurier, Michael Rabbat
DIMVA
2010
15 years 3 months ago
HookScout: Proactive Binary-Centric Hook Detection
Abstract. In order to obtain and maintain control, kernel malware usually makes persistent control flow modifications (i.e., installing hooks). To avoid detection, malware develope...
Heng Yin, Pongsin Poosankam, Steve Hanna, Dawn Xia...
IADIS
2004
15 years 2 months ago
A design of digital rights management system utilizing multimedia content identifiers
All around of people live in the age based on information and knowledge in recent period. It is WWW/Internet technology that provides efficiency and power, which can lead the new ...
Seok-Hoon Kim, Sang-Hoon Oh, Jung-Hoon Hahm
ISICT
2004
15 years 2 months ago
Extending desktop applications to the web
Web applications have become the major means to allow ubiquitous access to backend systems via a web browser. Several technologies such as JSP, ASP.NET, or Java Server Faces exist ...
Arno Puder