Sciweavers

94 search results - page 18 / 19
» An Efficient and Effective Methodology on the Multiple Fault...
Sort
View
VEE
2006
ACM
142views Virtualization» more  VEE 2006»
14 years 1 months ago
Secure and practical defense against code-injection attacks using software dynamic translation
One of the most common forms of security attacks involves exploiting a vulnerability to inject malicious code into an executing application and then cause the injected code to be ...
Wei Hu, Jason Hiser, Daniel Williams, Adrian Filip...
ICC
2007
IEEE
146views Communications» more  ICC 2007»
14 years 1 months ago
Media Access Control with Spatial Correlation for MIMO Ad Hoc Networks
– MIMO (Multiple Input Multiple Output) is capable of offering several-fold increase in spectral efficiency over singleantenna systems through spatial processing. However, curren...
Bing Wen Ke, Ying Jun Zhang, Soung Chang Liew
AGENTS
2000
Springer
13 years 12 months ago
Adaptive Trust and Co-operation: An Agent-Based Simulation Approach
This paper extends earlier work in the use of ‘Agent-based Computational Economics’ (ACE) for modelling the development of co-operation between firms. Inter-firm relations hav...
Bart Nooteboom, Tomas Klos, René J. Jorna
VLDB
2008
ACM
178views Database» more  VLDB 2008»
14 years 7 months ago
The Bdual-Tree: indexing moving objects by space filling curves in the dual space
Abstract Existing spatiotemporal indexes suffer from either large update cost or poor query performance, except for the Bx -tree (the state-of-the-art), which consists of multiple ...
Man Lung Yiu, Yufei Tao, Nikos Mamoulis
EUROPAR
2004
Springer
13 years 11 months ago
Imprecise Exceptions in Distributed Parallel Components
Abstract. Modern microprocessors have sacrificed the exactness of exceptions for improved performance long ago. This is a side effect of reordering instructions so that the micropr...
Kostadin Damevski, Steven G. Parker