A survey of stealth malware attacks, mitigation measures, and steps toward autonomous open world solutions

EM Rudd, A Rozsa, M Günther… - … Surveys & Tutorials, 2016 - ieeexplore.ieee.org
As our professional, social, and financial existences become increasingly digitized and as
our government, healthcare, and military infrastructures rely more on computer technologies …

Modern release engineering in a nutshell--why researchers should care

B Adams, S McIntosh - 2016 IEEE 23rd international …, 2016 - ieeexplore.ieee.org
The release engineering process is the process that brings high quality code changes from
a developer's workspace to the end user, encompassing code change integration …

Operating system concepts for reconfigurable computing: review and survey

M Eckert, D Meyer, J Haase… - International Journal of …, 2016 - Wiley Online Library
One of the key future challenges for reconfigurable computing is to enable higher design
productivity and a more easy way to use reconfigurable computing systems for users that are …

Integrated tasks assignment and routing for the estimation of the optimal number of AGVS

K Vivaldini, LF Rocha, NJ Martarelli, M Becker… - … International Journal of …, 2016 - Springer
A fundamental problem in the management of an automated guided vehicle system (AGVS)
is the determination of the load to be transported and the vehicle to transport it. The time for …

Software aging analysis of the android mobile os

D Cotroneo, F Fucci, AK Iannillo… - 2016 IEEE 27th …, 2016 - ieeexplore.ieee.org
Mobile devices are significantly complex, feature-rich, and heavily customized, thus they are
prone to software reliability and performance issues. This paper considers the problem of …

[图书][B] Music data analysis: Foundations and applications

C Weihs, D Jannach, I Vatolkin, G Rudolph - 2016 - taylorfrancis.com
This book provides a comprehensive overview of music data analysis, from introductory
material to advanced concepts. It covers various applications including transcription and …

Компоненты цифрового суверенитета Российской Федерации как техническая основа информационной безопасности

ВВ Бухарин - Вестник МГИМО университета, 2016 - cyberleninka.ru
В статье рассматривается возникновение в России понятия «информационный
суверенитет», перспективы его практического и теоретического введения в научный …

Counting clusters in twitter posts

A Bates, J Kalita - Proceedings of the Second International Conference …, 2016 - dl.acm.org
The Internet is full of information contained in short texts. These texts, sometimes called
microblogs, can include a wealth of useful data. Twitter is a well known microblogging …

[图书][B] Computer Systems Architecture

A Yadin - 2016 - taylorfrancis.com
Computer Systems Architecture provides IT professionals and students with the necessary
understanding of computer hardware. It addresses the ongoing issues related to computer …

Segment and conflict aware page allocation and migration in DRAM-PCM hybrid main memory

HA Khouzani, FS Hosseini… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Phase change memory (PCM), given its nonvolatility, potential high density, and low standby
power, is a promising candidate to be used as main memory in next generation computer …