Sciweavers

1042 search results - page 107 / 209
» Representing real numbers in a generalized numeration system
Sort
View
ISW
2007
Springer
15 years 7 months ago
Detecting System Emulators
Malware analysis is the process of determining the behavior and purpose of a given malware sample (such as a virus, worm, or Trojan horse). This process is a necessary step to be a...
Thomas Raffetseder, Christopher Krügel, Engin...
JSSPP
2009
Springer
15 years 8 months ago
Modeling Parallel System Workloads with Temporal Locality
In parallel systems, similar jobs tend to arrive within bursty periods. This fact leads to the existence of the locality phenomenon, a persistent similarity between nearby jobs, in...
Tran Ngoc Minh, Lex Wolters
SACMAT
2009
ACM
15 years 8 months ago
xDomain: cross-border proofs of access
A number of research systems have demonstrated the benefits of accompanying each request with a machine-checkable proof that the request complies with access-control policy — a...
Lujo Bauer, Limin Jia, Michael K. Reiter, David Sw...
MM
2010
ACM
167views Multimedia» more  MM 2010»
15 years 1 months ago
Improving online gaming quality using detour paths
We study the problem of improving the user perceived quality of online games in which multiple players form a game session and exchange game-state updates over an overlay network....
Cong Ly, Cheng-Hsin Hsu, Mohamed Hefeeda
ICC
2007
IEEE
164views Communications» more  ICC 2007»
15 years 7 months ago
Communication Limits with Low Precision Analog-to-Digital Conversion at the Receiver
— We examine the Shannon limits of communication systems when the precision of the analog-to-digital conversion (ADC) at the receiver is constrained. ADC is costly and powerhungr...
Jaspreet Singh, Onkar Dabeer, Upamanyu Madhow