Sciweavers

8086 search results - page 1423 / 1618
» On the Implementation of Dynamic Patterns
Sort
View
RAID
2010
Springer
15 years 2 months ago
Hybrid Analysis and Control of Malware
Abstract. Malware attacks necessitate extensive forensic analysis efforts that are manual-labor intensive because of the analysis-resistance techniques that malware authors employ....
Kevin A. Roundy, Barton P. Miller
SIGOPS
2010
171views more  SIGOPS 2010»
15 years 2 months ago
Cassandra: a decentralized structured storage system
Cassandra is a distributed storage system for managing very large amounts of structured data spread out across many commodity servers, while providing highly available service wit...
Avinash Lakshman, Prashant Malik
SMC
2010
IEEE
198views Control Systems» more  SMC 2010»
15 years 2 months ago
Deep web data extraction
—Deep Web contents are accessed by queries submitted to Web databases and the returned data records are enwrapped in dynamically generated Web pages (they will be called deep Web...
Jer Lang Hong
VTC
2010
IEEE
157views Communications» more  VTC 2010»
15 years 2 months ago
Multi-Room IPTV Delivery through Pseudo-Broadcast over IEEE 802.11 Links
Abstract—The IEEE 802.11 wireless LAN (WLAN) is a timetested technology, but it is still evolving towards even higher speeds and richer features. For multi-room IPTV delivery, wh...
Yongtae Park, Chiho Jo, Sangki Yun, Hyogon Kim
WCRE
2010
IEEE
15 years 2 months ago
Immediacy through Interactivity: Online Analysis of Run-time Behavior
—Visualizations of actual run-time data support the comprehension of programs, like examples support the ion of abstract concepts and principles. Unfortunately, the required run-...
Michael Perscheid, Bastian Steinert, Robert Hirsch...
« Prev « First page 1423 / 1618 Last » Next »