Sciweavers

450 search results - page 85 / 90
» Network intrusion investigation - Preparation and challenges
Sort
View
BMCBI
2011
14 years 4 months ago
Implementation of Force Distribution Analysis for Molecular Dynamics simulations
Background: The way mechanical stress is distributed inside and propagated by proteins and other biopolymers largely defines their function. Yet, determining the network of intera...
Wolfram Stacklies, Christian Seifert, Frauke Graet...
CNSR
2011
IEEE
238views Communications» more  CNSR 2011»
14 years 1 months ago
Measurement Study on PPLive Based on Channel Popularity
Abstract—In recent years, Peer-to-Peer (P2P) streaming systems experienced tremendous growth and became one of the largest bandwidth consumer on Internet. PPLive, one of the most...
Ruixuan Li, Guoqiang Gao, Weijun Xiao, Zhiyong Xu
MOBISYS
2011
ACM
14 years 15 days ago
Security versus energy tradeoffs in host-based mobile malware detection
The rapid growth of mobile malware necessitates the presence of robust malware detectors on mobile devices. However, running malware detectors on mobile devices may drain their ba...
Jeffrey Bickford, H. Andrés Lagar-Cavilla, ...
CIKM
2011
Springer
13 years 9 months ago
Building directories for social tagging systems
Today, a number of algorithms exist for constructing tag hierarchies from social tagging data. While these algorithms were designed with ontological goals in mind, we know very li...
Denis Helic, Markus Strohmaier
CODES
2006
IEEE
15 years 3 months ago
Integrated analysis of communicating tasks in MPSoCs
Predicting timing behavior is key to efficient embedded real-time system design and verification. Especially memory accesses and co-processor calls over shared communication net...
Simon Schliecker, Matthias Ivers, Rolf Ernst