Sciweavers

416 search results - page 57 / 84
» Some new approaches for preventing software tampering
Sort
View
SBACPAD
2003
IEEE
121views Hardware» more  SBACPAD 2003»
15 years 5 months ago
Optimizing Packet Capture on Symmetric Multiprocessing Machines
Traffic monitoring and analysis based on general purpose systems with high speed interfaces, such as Gigabit Ethernet and 10 Gigabit Ethernet, requires carefully designed software...
Gianluca Varenni, Mario Baldi, Loris Degioanni, Fu...
IJVR
2008
144views more  IJVR 2008»
14 years 10 months ago
PC Clusters for Virtual Reality
In the late 90's, the emergence of high-performance 3D commodity graphics cards paved the way to the use of PC clusters for high-performance Virtual Reality (VR) applications....
Luciano P. Soares, Bruno Raffin, Joaquim A. Jorge
RAID
2010
Springer
14 years 10 months ago
Bait Your Hook: A Novel Detection Technique for Keyloggers
Software keyloggers are a fast growing class of malware often used to harvest confidential information. One of the main reasons for this rapid growth is the possibility for unpriv...
Stefano Ortolani, Cristiano Giuffrida, Bruno Crisp...
88
Voted
ARITH
2003
IEEE
15 years 5 months ago
Decimal Floating-Point: Algorism for Computers
Decimal arithmetic is the norm in human calculations, and human-centric applications must use a decimal floating-point arithmetic to achieve the same results. Initial benchmarks i...
Michael F. Cowlishaw
SPLC
2008
15 years 1 months ago
Functional Testing of Feature Model Analysis Tools. A First Step
The automated analysis of Feature Models (FMs) focuses on the usage of different logic paradigms and solvers to implement a number of analysis operations on FMs. The implementatio...
Sergio Segura, David Benavides, Antonio Ruiz Cort&...