Sciweavers

10674 search results - page 1993 / 2135
» The Virtual Environment - Another Approach
Sort
View
SOCIALCOM
2010
15 years 2 months ago
Managed Mission Assurance - Concept, Methodology and Runtime Support
We interpret "mission assurance" to mean the guarantee that Mission Essential Functionality (MEF) provided by an information system is continued despite partial failures ...
Partha Pratim Pal, Kurt Rohloff, Michael Atighetch...
WEA
2010
Springer
311views Algorithms» more  WEA 2010»
15 years 2 months ago
Realtime Classification for Encrypted Traffic
Classifying network flows by their application type is the backbone of many crucial network monitoring and controlling tasks, including billing, quality of service, security and tr...
Roni Bar-Yanai, Michael Langberg, David Peleg, Lia...
WISTP
2010
Springer
15 years 2 months ago
Efficient and Effective Buffer Overflow Protection on ARM Processors
Although many countermeasures have been developed for desktop and server environments, buffer overflows still pose a big threat. The same approach can be used to target mobile devi...
Raoul Strackx, Yves Younan, Pieter Philippaerts, F...
CEC
2009
IEEE
15 years 2 months ago
Open-ended on-board Evolutionary Robotics for robot swarms
The SYMBRION project stands at the crossroads of Artificial Life and Evolutionary Robotics: a swarm of real robots undergoes online evolution by exchanging information in a decentr...
G. Baele, Nicolas Bredeche, Evert Haasdijk, Steven...
ICC
2009
IEEE
164views Communications» more  ICC 2009»
15 years 2 months ago
Static Analysis of Executables for Collaborative Malware Detection on Android
Smartphones are getting increasingly popular and several malwares appeared targeting these devices. General countermeasures to smartphone malwares are currently limited to signatur...
Aubrey-Derrick Schmidt, Rainer Bye, Hans-Gunther S...
« Prev « First page 1993 / 2135 Last » Next »