Sciweavers

817 search results - page 135 / 164
» Malware behaviour analysis
Sort
View
APLAS
2009
ACM
15 years 6 months ago
Asymptotic Resource Usage Bounds
When describing the resource usage of a program, it is usual to talk in asymptotic terms, such as the well-known “big O” notation, whereby we focus on the behaviour of the prog...
Elvira Albert, Diego Alonso, Puri Arenas, Samir Ge...
IWCMC
2009
ACM
15 years 6 months ago
Energy penalties for non-shortest paths in wireless sensor networks with link failures
This paper addresses the additional energy consumption in wireless sensor networks where the communication between the sensor nodes and the sink nodes does not always make use of ...
Geir Egeland, Paal E. Engelstad
PETRA
2009
ACM
15 years 6 months ago
Design and prototype of a device to engage cognitively disabled older adults in visual artwork
We investigate technological solutions for arts therapists who work with older adults with cognitive disabilities, such as Alzheimer’s disease. We present ethnographic analysis ...
Scott Blunsden, Brandi Richards, Jennifer Boger, A...
IEEEARES
2008
IEEE
15 years 6 months ago
Detecting Bots Based on Keylogging Activities
—A bot is a piece of software that is usually installed on an infected machine without the user’s knowledge. A bot is controlled remotely by the attacker under a Command and Co...
Yousof Al-Hammadi, Uwe Aickelin
ADAEUROPE
2008
Springer
15 years 6 months ago
An Ada 2005 Technology for Distributed and Real-Time Component-Based Applications
: The concept of interface in Ada 2005 significantly facilitates its usage as the basis for a software components technology. This technology, taking benefit of the resources that ...
Patricia López Martínez, José...