Sciweavers

4305 search results - page 257 / 861
» Analysing Protocol Implementations
Sort
View
USENIX
1993
13 years 11 months ago
Measurement, Analysis, and Improvement of UDP/IP Throughput for the DECstation 5000
Networking software is a growing bottleneck in modern workstations, particularly for high throughput applications such as networked digital video. We measure various components of...
Jonathan Kay, Joseph Pasquale
POPL
2000
ACM
14 years 2 months ago
Enforcing Trace Properties by Program Transformation
We propose an automatic method to enforce trace properties on programs. The programmer specifies the property separately from the program; a program transformer takes the program...
Thomas Colcombet, Pascal Fradet
CC
2006
Springer
122views System Software» more  CC 2006»
14 years 1 months ago
Context-Sensitive Points-to Analysis: Is It Worth It?
We present the results of an empirical study evaluating the precision of subset-based points-to analysis with several variations of context sensitivity on Java benchmarks of signif...
Ondrej Lhoták, Laurie J. Hendren
OOPSLA
2007
Springer
14 years 3 months ago
Modular typestate checking of aliased objects
Objects often define usage protocols that clients must follow in order for these objects to work properly. Aliasing makes it notoriously difficult to check whether clients and i...
Kevin Bierhoff, Jonathan Aldrich
SERSCISA
2009
Springer
14 years 4 months ago
A Kademlia-Based Node Lookup System for Anonymization Networks
Node lookup mechanisms constitute an integral part of any overlay network, and hence also of anonymous communication networks. Today, most anonymizers use centralized directories, ...
Benedikt Westermann, Andriy Panchenko, Lexi Pimeni...