Sciweavers

356 search results - page 50 / 72
» aims 2011
Sort
View
CCS
2011
ACM
13 years 9 months ago
The power of procrastination: detection and mitigation of execution-stalling malicious code
Malware continues to remain one of the most important security problems on the Internet today. Whenever an anti-malware solution becomes popular, malware authors typically react p...
Clemens Kolbitsch, Engin Kirda, Christopher Kruege...
CLEF
2011
Springer
13 years 9 months ago
Towards a Living Lab for Information Retrieval Research and Development - A Proposal for a Living Lab for Product Search Tasks
Abstract. The notion of having a “living lab” to undertaken evaluations has been proposed by a number of proponents within the field of Information Retrieval (IR). However, wh...
Leif Azzopardi, Krisztian Balog
100
Voted
CODES
2011
IEEE
13 years 9 months ago
Design and architectures for dependable embedded systems
The paper presents an overview of a major research project on dependable embedded systems that has started in Fall 2010 and is running for a projected duration of six years. Aim i...
Jörg Henkel, Lars Bauer, Joachim Becker, Oliv...
COMSUR
2011
203views Hardware» more  COMSUR 2011»
13 years 9 months ago
Overcoming Adversaries in Sensor Networks: A Survey of Theoretical Models and Algorithmic Approaches for Tolerating Malicious In
Interference is an unavoidable property of the wireless communication medium and, in sensor networks, such interference is exacerbated due to the energy-starved nature of the netw...
Maxwell Young, Raouf Boutaba
COMSUR
2011
251views Hardware» more  COMSUR 2011»
13 years 9 months ago
Denial of Service Attacks in Wireless Networks: The Case of Jammers
—The shared nature of the medium in wireless networks makes it easy for an adversary to launch a Wireless Denial of Service (WDoS) attack. Recent studies, demonstrate that such a...
Konstantinos Pelechrinis, M. Iliofotou, Srikanth V...