Sciweavers

8294 search results - page 1437 / 1659
» Presenting Data from Experiments in Algorithmics
Sort
View
ICSE
2008
IEEE-ACM
16 years 3 months ago
CCVisu: automatic visual software decomposition
Understanding the structure of large existing (and evolving) software systems is a major challenge for software engineers. In reverse engineering, we aim to compute, for a given s...
Dirk Beyer
161
Voted
SP
2009
IEEE
262views Security Privacy» more  SP 2009»
15 years 10 months ago
Automatic Reverse Engineering of Malware Emulators
Malware authors have recently begun using emulation technology to obfuscate their code. They convert native malware binaries into bytecode programs written in a randomly generated...
Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffi...
MOBIQUITOUS
2008
IEEE
15 years 10 months ago
Congestion control protocol for wireless sensor networks handling prioritized heterogeneous traffic
Heterogeneous applications could be assimilated within the same wireless sensor network with the aid of modern motes that have multiple sensor boards on a single radio board. Diff...
Muhammad Mostafa Monowar, Md. Obaidur Rahman, Al-S...
CISS
2007
IEEE
15 years 10 months ago
Video Sensor Node for Low-Power Ad-hoc Wireless Networks
A video sensor platform consisting of a smart image sensor with focal plane motion processing is presented. The camera node is intended for ultra-low bandwidth ad-hoc wireless netw...
Yu M. Chi, Ralph Etienne-Cummings, Gert Cauwenberg...
ICDT
2007
ACM
185views Database» more  ICDT 2007»
15 years 10 months ago
Characterization of the Interaction of XML Functional Dependencies with DTDs
With the rise of XML as a standard model of data exchange, XML functional dependencies (XFDs) have become important to areas such as key analysis, document normalization, and data ...
Lucja Kot, Walker M. White
« Prev « First page 1437 / 1659 Last » Next »