Sciweavers

1805 search results - page 305 / 361
» Understanding Code Mobility
Sort
View
CAV
2011
Springer
216views Hardware» more  CAV 2011»
14 years 2 months ago
Malware Analysis with Tree Automata Inference
Abstract. The underground malware-based economy is flourishing and it is evident that the classical ad-hoc signature detection methods are becoming insufficient. Malware authors ...
Domagoj Babic, Daniel Reynaud, Dawn Song
ICDE
2011
IEEE
233views Database» more  ICDE 2011»
14 years 2 months ago
Schema evolution analysis for embedded databases
—Dynamic software updating research efforts have mostly been focused on updating application code and in-memory state. As more and more applications use embedded databases for st...
Shengfeng Wu, Iulian Neamtiu
FASE
2012
Springer
13 years 6 months ago
Cohesive and Isolated Development with Branches
The adoption of distributed version control (DVC), such as Git and Mercurial, in open-source software (OSS) projects has been explosive. Why is this and how are projects using DVC?...
Earl T. Barr, Christian Bird, Peter C. Rigby, Abra...
ICIP
2008
IEEE
16 years 27 days ago
Receiver driven layered multicast with layer-aware forward error correction
A wide range of different capabilities and connection qualities typically characterizes receivers of mobile television services. Receiver driven layered multicast (RDLM) offers an...
Cornelius Hellge, Thomas Schierl, Thomas Wiegand
ICIP
2005
IEEE
16 years 25 days ago
3GPP compliant adaptive wireless video streaming using H.264/AVC
In 3GPP a standard for multimedia streaming over mobile networks called PSS (Packet-switched Streaming Service) has been specified. In order to deal with changing transmission char...
Thomas Schierl, Thomas Wiegand, Markus Kampmann