Sciweavers

3467 search results - page 603 / 694
» A New Localized Network Based Routing Model in Computer and ...
Sort
View
NDSS
2007
IEEE
14 years 2 months ago
RICH: Automatically Protecting Against Integer-Based Vulnerabilities
We present the design and implementation of RICH (Run-time Integer CHecking), a tool for efficiently detecting integer-based attacks against C programs at run time. C integer bug...
David Brumley, Dawn Xiaodong Song, Tzi-cker Chiueh...
BMCBI
2007
157views more  BMCBI 2007»
13 years 8 months ago
Constructing gene co-expression networks and predicting functions of unknown genes by random matrix theory
Background: Large-scale sequencing of entire genomes has ushered in a new age in biology. One of the next grand challenges is to dissect the cellular networks consisting of many i...
Feng Luo, Yunfeng Yang, Jianxin Zhong, Haichun Gao...
IMC
2007
ACM
13 years 9 months ago
Acyclic type-of-relationship problems on the internet: an experimental analysis
An experimental study of the feasibility and accuracy of the acyclicity approach introduced in [14] for the inference of business relationships among autonomous systems (ASes) is ...
Benjamin Hummel, Sven Kosub
GLOBECOM
2009
IEEE
14 years 2 months ago
Multiple Radio Channel Assignement Utilizing Partially Overlapped Channels
— Existing channel assignment algorithms designed for multi-radio multi-channel wireless mesh networks (MRMC-WMN) mainly deal with orthogonal or nonoverlapped channels. But in re...
Mohammad Asadul Hoque, Xiaoyan Hong, Farhana Afroz
WETICE
1998
IEEE
14 years 2 days ago
A Deontic Formalism for Co-ordinating Software Development in Virtual Software Corporations
The concept of the Virtual Software Corporation (VSC) has recently become a practical reality as a result of advances in communication and distributed technologies. However, there...
Zsolt Haag, Richard Foley, Julian Newman