Sciweavers

4719 search results - page 802 / 944
» Newtonian program analysis
Sort
View
HICSS
2007
IEEE
135views Biometrics» more  HICSS 2007»
15 years 10 months ago
Composable Language Extensions for Computational Geometry: A Case Study
— This paper demonstrates how two different sets of powerful domain specific language features can be specified and deployed as composable language extensions. These extensions...
Eric Van Wyk, Eric Johnson
ICC
2007
IEEE
184views Communications» more  ICC 2007»
15 years 10 months ago
Lifetime Improvement of Wireless Sensor Networks by Collaborative Beamforming and Cooperative Transmission
Abstract— Extending network lifetime of battery-operated devices is a key design issue that allows uninterrupted information exchange among distributive nodes in wireless sensor ...
Zhu Han, Harold Vincent Poor
127
Voted
ICC
2007
IEEE
141views Communications» more  ICC 2007»
15 years 10 months ago
A Hybrid Model to Detect Malicious Executables
— We present a hybrid data mining approach to detect malicious executables. In this approach we identify important features of the malicious and benign executables. These feature...
Mohammad M. Masud, Latifur Khan, Bhavani M. Thurai...
ICMCS
2007
IEEE
144views Multimedia» more  ICMCS 2007»
15 years 10 months ago
A Framework for Modular Signal Processing Systems with High-Performance Requirements
This paper introduces the software framework MMER Lab which allows an effective assembly of modular signal processing systems optimized for memory efficiency and performance. Our...
Lukas Diduch, Ronald Müller, Gerhard Rigoll
ICNP
2007
IEEE
15 years 10 months ago
Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms
—It is crucial to detect zero-day polymorphic worms and to generate signatures at the edge network gateways or honeynets so that we can prevent the worms from propagating at thei...
Zhichun Li, Lanjia Wang, Yan Chen, Zhi Fu