Sciweavers

1721 search results - page 322 / 345
» On Active and Passive Testing
Sort
View
67
Voted
INFOCOM
2009
IEEE
15 years 4 months ago
Detecting Spam Zombies by Monitoring Outgoing Messages
—Compromised machines are one of the key security threats on the Internet; they are often used to launch various security attacks such as DDoS, spamming, and identity theft. In t...
Zhenhai Duan, Peng Chen, Fernando Sanchez, Yingfei...
92
Voted
ISCA
2009
IEEE
136views Hardware» more  ISCA 2009»
15 years 4 months ago
ECMon: exposing cache events for monitoring
The advent of multicores has introduced new challenges for programmers to provide increased performance and software reliability. There has been significant interest in technique...
Vijay Nagarajan, Rajiv Gupta
QI
2009
Springer
123views Physics» more  QI 2009»
15 years 4 months ago
Hilbert Space Models Commodity Exchanges
Abstract. It is argued that the vector space measures used to measure closeness of market prices to predictors for market prices are invalid because of the observed metric of commo...
Paul Cockshott
CANDC
2009
ACM
15 years 4 months ago
Subliminal wiretapping
Subliminal Wiretapping is a subtly interactive artwork that utilizes random number generation modified through mindmatter effects to supply a continuous stream of words. Frequent,...
Shawn Lawson
BMEI
2008
IEEE
15 years 4 months ago
Development of Epicardial Mapping System for Studying Atrial Fibrillation
Epicardial mapping system is an important tool for studying electrophysiological characteristics of atrial fibrillation (AF). AF is the most common arrhythmia and is becoming more...
Cuiwei Yang, Weijia Lu, Tuo Zhou, Xiaomei Wu, Zuxi...