Sciweavers

3310 search results - page 610 / 662
» Aspect-aware operating system development
Sort
View
ECOOP
2005
Springer
14 years 2 months ago
Interprocedural Analysis for Privileged Code Placement and Tainted Variable Detection
In Java 2 and Microsoft .NET Common Language Runtime (CLR), trusted code has often been programmed to perform accessrestricted operations not explicitly requested by its untrusted ...
Marco Pistoia, Robert J. Flynn, Larry Koved, Vugra...
IMC
2004
ACM
14 years 2 months ago
Characteristics of internet background radiation
Monitoring any portion of the Internet address space reveals incessant activity. This holds even when monitoring traffic sent to unused addresses, which we term “background rad...
Ruoming Pang, Vinod Yegneswaran, Paul Barford, Ver...
SIGMETRICS
2003
ACM
130views Hardware» more  SIGMETRICS 2003»
14 years 2 months ago
Analysis of TCP's computational energy cost for mobile computing
In this paper we present results from a detailed measurement study of TCP (Transmission Control Protocol) running over a wireless link. Our primary goal was on obtaining a breakdo...
Bokyung Wang, Suresh Singh
WSNA
2003
ACM
14 years 2 months ago
Analyzing and modeling encryption overhead for sensor network nodes
Recent research in sensor networks has raised security issues for small embedded devices. Security concerns are motivated by the deployment of a large number of sensory devices in...
Prasanth Ganesan, Ramnath Venugopalan, Pushkin Ped...
IPPS
1999
IEEE
14 years 1 months ago
Process Networks as a High-Level Notation for Metacomputing
Abstract. Our work involves the development of a prototype Geographical Information System GIS as an example of the use of process networks as a well-de ned high-level semantic mod...
Darren Webb, Andrew L. Wendelborn, Kevin Maciunas