Sciweavers

7544 search results - page 1327 / 1509
» Network Forensics Analysis
Sort
View
145
Voted
ICSE
2004
IEEE-ACM
16 years 4 months ago
A Framework for Ensuring and Improving Dependability in Highly Distributed Systems
A distributed software system's deployment architecture can have a significant impact on the system's dependability. Dependability is a function of various system paramet...
Sam Malek, Nels Beckman, Marija Mikic-Rakic, Nenad...
140
Voted
ICSE
2008
IEEE-ACM
16 years 4 months ago
LISABETH: automated content-based signature generator for zero-day polymorphic worms
Modern worms can spread so quickly that any countermeasure based on human reaction might not be fast enough. Recent research has focused on devising algorithms to automatically pr...
Lorenzo Cavallaro, Andrea Lanzi, Luca Mayer, Matti...
PPOPP
2010
ACM
16 years 1 months ago
Symbolic prefetching in transactional distributed shared memory
We present a static analysis for the automatic generation of symbolic prefetches in a transactional distributed shared memory. A symbolic prefetch specifies the first object to be...
Alokika Dash, Brian Demsky
134
Voted
ICDCS
2009
IEEE
16 years 1 months ago
The Digital Marauder's Map: A New Threat to Location Privacy
“The Marauder’s Map” is a magical map in J. K. Rowling’s fantasy series, “Harry Potter and the Prisoner of Azkaban”. It shows all moving objects within the “Hogwarts...
Xinwen Fu, Nan Zhang 0004, Aniket Pingley, Wei Yu,...
ICCAD
2006
IEEE
116views Hardware» more  ICCAD 2006»
16 years 1 months ago
Enhanced error vector magnitude (EVM) measurements for testing WLAN transceivers
As wireless LAN devices become more prevalent in the consumer electronics market, there is an ever increasing pressure to reduce their overall cost. The test cost of such devices ...
Erkan Acar, Sule Ozev, Kevin B. Redmond
« Prev « First page 1327 / 1509 Last » Next »