Sciweavers

181 search results - page 30 / 37
» Towards a Philosophy of Instruction
Sort
View
105
Voted
DIMVA
2006
15 years 1 months ago
Network-Level Polymorphic Shellcode Detection Using Emulation
Abstract. As state-of-the-art attack detection technology becomes more prevalent, attackers are likely to evolve, employing techniques such as polymorphism and metamorphism to evad...
Michalis Polychronakis, Kostas G. Anagnostakis, Ev...
TC
2008
14 years 11 months ago
Secure Memory Accesses on Networks-on-Chip
Security is gaining relevance in the development of embedded devices. Toward a secure system at each level of design, this paper addresses security aspects related to Network-on-Ch...
Leandro Fiorin, Gianluca Palermo, Slobodan Lukovic...
VIROLOGY
2008
68views more  VIROLOGY 2008»
14 years 11 months ago
Internet attacks monitoring with dynamic connection redirection mechanisms
High-interaction honeypots are interesting as they help understand how attacks unfold on a compromised machine. However, observations are generally limited to the operations perfo...
Eric Alata, Ion Alberdi, Vincent Nicomette, Philip...
ICRA
2010
IEEE
125views Robotics» more  ICRA 2010»
14 years 10 months ago
Inferring the semantics of direction signs in public places
Abstract— Most large-scale public environments provide direction signs to facilitate the orientation for humans and to find their way to a goal location in the environment. Thus...
Jérôme Maye, Luciano Spinello, Rudolp...
MICRO
2010
IEEE
167views Hardware» more  MICRO 2010»
14 years 9 months ago
Erasing Core Boundaries for Robust and Configurable Performance
Single-thread performance, reliability and power efficiency are critical design challenges of future multicore systems. Although point solutions have been proposed to address thes...
Shantanu Gupta, Shuguang Feng, Amin Ansari, Scott ...