Sciweavers

465 search results - page 65 / 93
» Shedding Light on the Weather
Sort
View
WCRE
2010
IEEE
14 years 10 months ago
Reverse Engineering Self-Modifying Code: Unpacker Extraction
—An important application of binary-level reverse engineering is in reconstructing the internal logic of computer malware. Most malware code is distributed in encrypted (or “pa...
Saumya K. Debray, Jay Patel
WDAG
2010
Springer
168views Algorithms» more  WDAG 2010»
14 years 10 months ago
Fast Randomized Test-and-Set and Renaming
Most people believe that renaming is easy: simply choose a name at random; if more than one process selects the same name, then try again. We highlight the issues that occur when t...
Dan Alistarh, Hagit Attiya, Seth Gilbert, Andrei G...
INFOCOM
2010
IEEE
14 years 10 months ago
Path Stitching: Internet-Wide Path and Delay Estimation from Existing Measurements
Many measurement systems have been proposed in recent years to shed light on the internal performance of the Internet. Their common goal is to allow distributed applications to imp...
D. K. Lee, Keon Jang, Changhyun Lee, Gianluca Iann...
96
Voted
SEMWEB
2010
Springer
14 years 10 months ago
When owl: sameAs Isn't the Same: An Analysis of Identity in Linked Data
Abstract. In Linked Data, the use of owl:sameAs is ubiquitous in interlinking data-sets. There is however, ongoing discussion about its use, and potential misuse, particularly with...
Harry Halpin, Patrick J. Hayes, James P. McCusker,...
122
Voted
SOCIALCOM
2010
14 years 10 months ago
The Dynamics of Two Cognitive Heuristics for Coordination on Networks
Abstract--This paper is about how groups solve global coordination problems such as the distributed graph coloring problem. We focused on scenarios in which agents are not able to ...
Iyad Rahwan, Fatemeh Jahedpari, Sherief Abdallah