Sciweavers

5066 search results - page 724 / 1014
» Spectra of structures and relations
Sort
View
140
Voted
SP
2007
IEEE
107views Security Privacy» more  SP 2007»
15 years 10 months ago
Lurking in the Shadows: Identifying Systemic Threats to Kernel Data
The integrity of kernel code and data is fundamental to the integrity of the computer system. Tampering with the kernel data is an attractive venue for rootkit writers since malic...
Arati Baliga, Pandurang Kamat, Liviu Iftode
SRDS
2007
IEEE
15 years 10 months ago
A Language-Based Approach for Improving the Robustness of Network Application Protocol Implementations
The secure and robust functioning of a network relies on the defect-free implementation of network applications. As network protocols have become increasingly complex, however, ha...
Laurent Burgy, Laurent Réveillère, J...
VTC
2007
IEEE
15 years 10 months ago
A Novel Timing and Frequency Offset Estimation Scheme for OFDM Systems
— A novel structure of training symbol is proposed for orthogonal frequency division multiplexing (OFDM) systems. With the proposed training symbol, which has repeated sample blo...
Shun-Sheng Wang, Chih-Peng Li, Chin-Liang Wang
WCRE
2007
IEEE
15 years 10 months ago
Documenting Typical Crosscutting Concerns
Our analysis of crosscutting concerns in real-life software systems (totaling over 500,000 LOC) and in reports from literature indicated a number of properties that allow for thei...
Marius Marin, Leon Moonen, Arie van Deursen
165
Voted
AAMAS
2007
Springer
15 years 10 months ago
Bifurcation Analysis of Reinforcement Learning Agents in the Selten's Horse Game
Abstract. The application of reinforcement learning algorithms to multiagent domains may cause complex non-convergent dynamics. The replicator dynamics, commonly used in evolutiona...
Alessandro Lazaric, Jose Enrique Munoz de Cote, Fa...