Results 61 to 70 of about 17,798 (178)

Reading the contents of deleted and modified files in the virtualization based black-box binary analysis system Drakvuf

open access: yesТруды Института системного программирования РАН, 2018
The article discusses ways to get the content of files, which are modified during the processing in the well-known open source dynamic analysis environment Drakvuf.
S. G. Kovalev
doaj  

SciTokens: Capability-Based Secure Access to Remote Scientific Data

open access: yes, 2018
The management of security credentials (e.g., passwords, secret keys) for computational science workflows is a burden for scientists and information security officers.
Basney, Jim   +7 more
core   +1 more source

A Low-Footprint Class Loading Mechanism for Embedded Java Virtual Machines [PDF]

open access: yes, 2004
This paper shows that it is possible to dramatically reduce the memory consumption of classes loaded in an embedded Java virtual machine without reducing its functionalities.
Courbot, Alexandre   +2 more
core   +2 more sources

Towards a General Framework for Formal Reasoning about Java Bytecode Transformation

open access: yes, 2012
Program transformation has gained a wide interest since it is used for several purposes: altering semantics of a program, adding features to a program or performing optimizations.
Lanet, Jean-Louis   +2 more
core   +4 more sources

Functionalism, revisionism, and qualia [PDF]

open access: yes, 2016
From the editor's introduction: "Ron Chrisley and Aaron Sloman open Part I of this issue with their article “Functionalism, Revisionism, and Qualia.” Chrisley and Sloman discuss revisionism about qualia—the view that tries to navigate between naïve ...
Chrisley, Ron, Sloman, Aaron
core  

Artificial Intelligence in the Context of Human Consciousness [PDF]

open access: yes, 2019
Artificial intelligence (AI) can be defined as the ability of a machine to learn and make decisions based on acquired information. AI’s development has incited rampant public speculation regarding the singularity theory: a futuristic phase in which ...
DeFries, Hannah
core   +1 more source

Towards virtual machine introspection based security framework for cloud

open access: yesSādhanā, 2019
Virtualization enables provision of resources to users according to their requirement through Infrastructure as a Service (IaaS) delivery model in cloud computing environment. Malicious users could lease cloud resources and use them as platforms to launch attacks.
Bhavesh Borisaniya, Dhiren Patel
openaire   +2 more sources

Benchmarking Hyper-Breakpoints for Efficient Virtual Machine Introspection

open access: yesElectronics
Virtual Machine Introspection (VMI) is a powerful technology used to detect and analyze malicious software inside Virtual Machines (VMs) from outside. Asynchronously accessing the VM’s memory can be insufficient for efficiently monitoring what is happening inside of a VM.
Lukas Beierlieb   +4 more
openaire   +1 more source

Thumbs up? Sentiment Classification using Machine Learning Techniques

open access: yes, 2002
We consider the problem of classifying documents not by topic, but by overall sentiment, e.g., determining whether a review is positive or negative. Using movie reviews as data, we find that standard machine learning techniques definitively outperform ...
Lee, Lillian   +2 more
core   +4 more sources

Home - About - Disclaimer - Privacy