Sciweavers

519 search results - page 69 / 104
» Control flow obfuscation with information flow tracking
Sort
View
COOPIS
2002
IEEE
14 years 1 months ago
Modeling Coordination and Control in Cross-Organizational Workflows
Current e-service technology paradigms require the analysis and conceptual modeling of cooperative inter-organizational workflows. Cooperation among different organizations is base...
Enzo Colombo, Chiara Francalanci, Barbara Pernici
TREC
2008
13 years 10 months ago
UTDallas at TREC 2008 Blog Track
This paper describes our participation in the 2008 TREC Blog track. Our system consists of 3 components: data preprocessing, topic retrieval, and opinion finding. In the topic ret...
Bin Li, Feifan Liu, Yang Liu
INFOCOM
2010
IEEE
13 years 6 months ago
Optimal Control of Wireless Networks with Finite Buffers
This paper considers network control for wireless networks with finite buffers. We investigate the performance of joint flow control, routing, and scheduling algorithms which achie...
Long Bao Le, Eytan Modiano, Ness B. Shroff

Publication
448views
15 years 7 months ago
Congestion Control using Multilevel Explicit Congestion Notification
Congestion remains one of the main obstacles to the Quality of Service (QoS) on the Internet. We think that a good solution to Internet congestion should optimally combine congesti...
Arjan Durresi, Leonard Barolli, Raj Jain, Makoto T...
EUROSYS
2009
ACM
14 years 5 months ago
Pointless tainting?: evaluating the practicality of pointer tainting
This paper evaluates pointer tainting, an incarnation of Dynamic Information Flow Tracking (DIFT), which has recently become an important technique in system security. Pointer tai...
Asia Slowinska, Herbert Bos