Sciweavers

2674 search results - page 94 / 535
» On architecture transparency in operating systems
Sort
View
CCS
2008
ACM
14 years 12 months ago
Ether: malware analysis via hardware virtualization extensions
Malware has become the centerpiece of most security threats on the Internet. Malware analysis is an essential technology that extracts the runtime behavior of malware, and supplie...
Artem Dinaburg, Paul Royal, Monirul I. Sharif, Wen...
ENGL
2006
87views more  ENGL 2006»
14 years 10 months ago
Multiagent Web based Decision Support Systems for Global Enterprises: An Architectural Blueprint
Financial institutions are striving to maximize benefits from the emerging digital economy. However, the decision to take such an investment option is contingent upon the "pr...
Tagelsir Mohamed Gasmelseid
ICRA
2009
IEEE
147views Robotics» more  ICRA 2009»
15 years 4 months ago
Equipping robot control programs with first-order probabilistic reasoning capabilities
— An autonomous robot system that is to act in a real-world environment is faced with the problem of having to deal with a high degree of both complexity as well as uncertainty. ...
Dominik Jain, Lorenz Mösenlechner, Michael Be...
SUTC
2008
IEEE
15 years 4 months ago
Controlled Disclosure of Context Information across Ubiquitous Computing Domains
One of the challenges in ubiquitous computing is that of mobility, which typically requires interaction between intelligent environments in different domains of administration. We...
Cristian Hesselman, Henk Eertink, Martin Wibbels, ...
NCA
2005
IEEE
15 years 3 months ago
Networking Aspects in the DPASA Survivability Architecture: An Experience Report
The same network infrastructure that is essential for the operation of today’s high valued distributed systems can also be misused by malicious attackers. Experience shows that ...
Michael Atighetchi, Paul Rubel, Partha Pratim Pal,...