Sciweavers

246 search results - page 11 / 50
» Operating System Profiling via Latency Analysis
Sort
View
108
Voted
CCS
2008
ACM
15 years 1 months ago
Ether: malware analysis via hardware virtualization extensions
Malware has become the centerpiece of most security threats on the Internet. Malware analysis is an essential technology that extracts the runtime behavior of malware, and supplie...
Artem Dinaburg, Paul Royal, Monirul I. Sharif, Wen...
APSEC
2000
IEEE
15 years 4 months ago
Survivability Analysis of Networked Systems
Survivability is the ability of a system to continue operating despite the presence of abnormal events such as failures and intrusions. Ensuring system survivability has increased...
Jeannette M. Wing
WSC
1997
15 years 1 months ago
Pallet Optimization and Throughput Estimation via Simulation
We describe a discrete-process simulation analysis of a production system at an automotive supply company. This simulation project was undertaken with the goals of demonstrating a...
Edward J. Williams, Andrew Gevaert
88
Voted
HPCA
1997
IEEE
15 years 3 months ago
ATM and Fast Ethernet Network Interfaces for User-Level Communication
Fast Ethernet and ATM are two attractive network technologies for interconnecting workstation clusters for parallel and distributed computing. This paper compares network interfac...
Matt Welsh, Anindya Basu, Thorsten von Eicken
SIMULATION
2010
150views more  SIMULATION 2010»
14 years 6 months ago
Profiling Literature in Healthcare Simulation
: The publications that relate to the application of simulation to healthcare have steadily increased over the years. These publications are scattered amongst various journals that...
Navonil Mustafee, Korina Katsaliaki, Simon J. E. T...