Sciweavers

726 search results - page 133 / 146
» An Access Control Scheme for Protecting Personal Data
Sort
View
TROB
2002
132views more  TROB 2002»
13 years 8 months ago
Performance of a distributed robotic system using shared communications channels
We have designed and built a set of miniature robots called Scouts and have developed a distributed software system to control them. This paper addresses the fundamental choices we...
Paul E. Rybski, Sascha Stoeter, Maria L. Gini, Dea...
ICST
2009
IEEE
14 years 3 months ago
An Initial Characterization of Industrial Graphical User Interface Systems
To date we have developed and applied numerous model-based GUI testing techniques; however, we are unable to provide definitive improvement schemes to real-world GUI test planners...
Penelope A. Brooks, Brian P. Robinson, Atif M. Mem...
IEEECIT
2006
IEEE
14 years 2 months ago
A Consistency Maintenance Approach in Replicated Services
Service-oriented architecture (SOA) making the interactions between applications much easier, but the service delay and unstable network will block the whole business process. Rep...
Jiangming Yang, Qiwei Zhang, Ning Gu
LCTRTS
2004
Springer
14 years 1 months ago
Spinach: a liberty-based simulator for programmable network interface architectures
This paper presents Spinach, a new simulator toolset specifically designed to target programmable network interface architectures. Spinach models both system components that are ...
Paul Willmann, Michael Brogioli, Vijay S. Pai
CCS
2005
ACM
14 years 2 months ago
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits
Vulnerabilities that allow worms to hijack the control flow of each host that they spread to are typically discovered months before the worm outbreak, but are also typically disc...
Jedidiah R. Crandall, Zhendong Su, Shyhtsun Felix ...