Sciweavers

302 search results - page 61 / 61
» Precise Service Level Agreements
Sort
View
ACSAC
2005
IEEE
15 years 5 months ago
Stealth Breakpoints
Microscopic analysis of malicious code (malware) requires the aid of a variety of powerful tools. Chief among them is a debugger that enables runtime binary analysis at an instruc...
Amit Vasudevan, Ramesh Yerraballi
BTW
2005
Springer
112views Database» more  BTW 2005»
15 years 5 months ago
Valid Updates for Persistent XML Objects
: XML has emerged as the industry standard for representing and exchanging data and is already predominant in several applications today. Business, analytic and structered data wil...
Henrike Schuhart, Volker Linnemann