Sciweavers

4212 search results - page 798 / 843
» Rights Expression Languages
Sort
View
FDL
2006
IEEE
15 years 10 months ago
MCF: A Metamodeling-based Visual Component Composition Framework
Reusing IP-cores to construct system models facilitated by automated generation of glue-logic, and automated composability checks can help designers to create efficient simulation...
Deepak Mathaikutty, Sandeep K. Shukla
SP
2006
IEEE
132views Security Privacy» more  SP 2006»
15 years 10 months ago
Towards Automatic Generation of Vulnerability-Based Signatures
In this paper we explore the problem of creating vulnerability signatures. A vulnerability signature matches all exploits of a given vulnerability, even polymorphic or metamorphic...
David Brumley, James Newsome, Dawn Xiaodong Song, ...
ASPLOS
2006
ACM
15 years 10 months ago
Temporal search: detecting hidden malware timebombs with virtual machines
Worms, viruses, and other malware can be ticking bombs counting down to a specific time, when they might, for example, delete files or download new instructions from a public we...
Jedidiah R. Crandall, Gary Wassermann, Daniela A. ...
INTERSENSE
2006
ACM
15 years 10 months ago
Programming wireless sensor networks with logical neighborhoods
— Wireless sensor network (WSN) architectures often feature a (single) base station in charge of coordinating the application functionality. Although this assumption simplified ...
Luca Mottola, Gian Pietro Picco
MM
2006
ACM
119views Multimedia» more  MM 2006»
15 years 10 months ago
Modelling dependency in multimedia streams
Expressing and analysing data dependency in multimedia streams is promising, since content-aware policies at a transport level would benefit from such services. In this paper we ...
Alexander Eichhorn