Sciweavers

2404 search results - page 476 / 481
» Postmodernism and Control Engineering
Sort
View
MM
2010
ACM
182views Multimedia» more  MM 2010»
14 years 9 months ago
A 3d data intensive tele-immersive grid
Networked virtual environments like Second Life enable distant people to meet for leisure as well as work. But users are represented through avatars controlled by keyboards and mo...
Benjamin Petit, Thomas Dupeux, Benoit Bossavit, Jo...
MOBICOM
2010
ACM
14 years 9 months ago
Sybot: an adaptive and mobile spectrum survey system for wifi networks
Information on site-specific spectrum characteristics is essential to evaluate and improve the performance of wireless networks. However, it is usually very costly to obtain accur...
Kyu-Han Kim, Alexander W. Min, Kang G. Shin
107
Voted
CCS
2010
ACM
14 years 9 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
SAC
2010
ACM
14 years 9 months ago
Improving the efficiency of dynamic malware analysis
Each day, security companies see themselves confronted with thousands of new malware programs. To cope with these large quantities, researchers and practitioners alike have develo...
Ulrich Bayer, Engin Kirda, Christopher Kruegel
AAMAS
2010
Springer
14 years 9 months ago
Evolutionary mechanism design: a review
Abstract The advent of large-scale distributed systems poses unique engineering challenges. In open systems such as the internet it is not possible to prescribe the behaviour of al...
Steve Phelps, Peter McBurney, Simon Parsons