Sciweavers

1314 search results - page 174 / 263
» New Approaches for Virtual Private Network Design
Sort
View
CCS
2007
ACM
15 years 8 months ago
Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction
An alarming trend in malware attacks is that they are armed with stealthy techniques to detect, evade, and subvert malware detection facilities of the victim. On the defensive sid...
Xuxian Jiang, Xinyuan Wang, Dongyan Xu
ICASSP
2010
IEEE
15 years 2 months ago
Towards large scale distributed coding
This paper considers the problem of distributed source coding for a large sensor network. A typical shortcoming of current approaches to true distributed coding is the exponential...
Sharadh Ramaswamy, Kumar Viswanatha, Ankur Saxena,...
SAS
2005
Springer
114views Formal Methods» more  SAS 2005»
15 years 7 months ago
Type-Safe Optimisation of Plugin Architectures
Programmers increasingly implement plugin architectures in type-safe object-oriented languages such as Java. A virtual machine can dynamically load class files containing plugins,...
Neal Glew, Jens Palsberg, Christian Grothoff
SECON
2010
IEEE
14 years 12 months ago
Adaptive Instantiation of the Protocol Interference Model in Mission-Critical Wireless Networks
Interference model is the basis of MAC protocol design in wireless networks, and it directly affects the efficiency and predictability of wireless messaging. To exploit the strengt...
Xin Che, Xiaohui Liu, Xi Ju, Hongwei Zhang
JUCS
2010
116views more  JUCS 2010»
15 years 12 days ago
Content Recommendation in APOSDLE using the Associative Network
: One of the success factors of Work Integrated Learning (WIL) is to provide the appropriate content to the users, both suitable for the topics they are currently working on, and t...
Hermann Stern, Rene Kaiser, Philip Hofmair, Peter ...