Sciweavers

15 search results - page 3 / 3
» Toward Automated Dynamic Malware Analysis Using CWSandbox
Sort
View
CCS
2009
ACM
14 years 1 months ago
Robust signatures for kernel data structures
Kernel-mode rootkits hide objects such as processes and threads using a technique known as Direct Kernel Object Manipulation (DKOM). Many forensic analysis tools attempt to detect...
Brendan Dolan-Gavitt, Abhinav Srivastava, Patrick ...
ICECCS
1996
IEEE
109views Hardware» more  ICECCS 1996»
13 years 10 months ago
Dynamically Reconfigurable Embedded Software - Does It Make Sense?
A dynamically reconfigurable real-time software (DRRTS) paradigm can be used effectively in the design of embedded systems to provide many major advantages over conventional softw...
David B. Stewart, Gaurav Arora
IPPS
2007
IEEE
14 years 17 days ago
An Adaptive Semantic Filter for Blue Gene/L Failure Log Analysis
— Frequent failure occurrences are becoming a serious concern to the community of high-end computing, especially when the applications and the underlying systems rapidly grow in ...
Yinglung Liang, Yanyong Zhang, Hui Xiong, Ramendra...
ICAC
2005
IEEE
13 years 12 months ago
Decentralised Autonomic Computing: Analysing Self-Organising Emergent Behaviour using Advanced Numerical Methods
When designing decentralised autonomic computing systems, a fundamental engineering issue is to assess systemwide behaviour. Such decentralised systems are characterised by the la...
Tom De Wolf, Giovanni Samaey, Tom Holvoet, Dirk Ro...
CSL
2007
Springer
13 years 6 months ago
Speaker-adaptive learning of resonance targets in a hidden trajectory model of speech coarticulation
A novel speaker-adaptive learning algorithm is developed and evaluated for a hidden trajectory model of speech coarticulation and reduction. Central to this model is the process o...
Dong Yu, Li Deng, Alex Acero