Sciweavers

1376 search results - page 35 / 276
» Monitoring Software Requirements Using Instrumented Code
Sort
View
SP
2002
IEEE
114views Security Privacy» more  SP 2002»
14 years 9 months ago
Efficiently building on-line tools for distributed heterogeneous environments
Software development is getting more and more complex, especially within distributed middleware-based environments. A major drawback during the overall software development proces...
Günther Rackl, Thomas Ludwig 0002, Markus Lin...
WORM
2003
14 years 11 months ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...
EUROSYS
2008
ACM
15 years 6 months ago
Eudaemon: involuntary and on-demand emulation against zero-day exploits
Eudaemon is a technique that aims to blur the borders between protected and unprotected applications, and brings together honeypot technology and end-user intrusion detection and ...
Georgios Portokalidis, Herbert Bos
EUROPAR
2009
Springer
15 years 2 months ago
Detailed Performance Analysis Using Coarse Grain Sampling
Performance evaluation tools enable analysts to shed light on how applications behave both from a general point of view and at concrete execution points, but cannot provide detaile...
Harald Servat, Germán Llort, Judit Gimenez,...
JNSM
2000
136views more  JNSM 2000»
14 years 9 months ago
Active Management Framework for Distributed Multimedia Systems
The successful deployment of next-generation distributed multimedia systems is signi cantly dependent on the e cient management support that improves the performance and the relia...
Ehab S. Al-Shaer