Sciweavers

1064 search results - page 212 / 213
» Tracking a Generator by Persistence
Sort
View
RAID
2010
Springer
13 years 4 months ago
Kernel Malware Analysis with Un-tampered and Temporal Views of Dynamic Kernel Memory
Dynamic kernel memory has been a popular target of recent kernel malware due to the difficulty of determining the status of volatile dynamic kernel objects. Some existing approach...
Junghwan Rhee, Ryan Riley, Dongyan Xu, Xuxian Jian...
ACSAC
2010
IEEE
13 years 4 months ago
Fast and practical instruction-set randomization for commodity systems
Instruction-set randomization (ISR) is a technique based on randomizing the "language" understood by a system to protect it from code-injection attacks. Such attacks wer...
Georgios Portokalidis, Angelos D. Keromytis
SECON
2010
IEEE
13 years 4 months ago
Tones for Real: Managing Multipath in Underwater Acoustic Wakeup
The principles of sensor networks--low-power, wireless, in-situ sensing with many inexpensive sensors--are only recently penetrating into underwater research. Acoustic communicati...
Affan A. Syed, John S. Heidemann, Wei Ye
EUSFLAT
2009
169views Fuzzy Logic» more  EUSFLAT 2009»
13 years 4 months ago
Decentralized Adaptive Fuzzy-Neural Control of an Anaerobic Digestion Bioprocess Plant
The paper proposed to use recurrent Fuzzy-Neural Multi-Model (FNMM) identifier for decentralized identification of a distributed parameter anaerobic wastewater treatment digestion ...
Ieroham S. Baruch, Rosalba Galvan-Guerra
IJMTM
2010
137views more  IJMTM 2010»
13 years 3 months ago
Entry-level engineering professionals and Product Lifecycle Management: a competency model
: In today's rapidly evolving global marketplace, jobs are continually being redefined due to technological innovations and a host of other factors. Workers are also being cal...
Sharron A. Frillman, Kari L. Wilde, Jonathan F. Ko...