Sciweavers

3161 search results - page 513 / 633
» Documenting framework behavior
Sort
View
154
Voted
ICMCS
2008
IEEE
158views Multimedia» more  ICMCS 2008»
15 years 9 months ago
Video quality assessment and comparative evaluation of peer-to-peer video streaming systems
We design a test methodology to analyze in detail the video quality received at each peer in a peer-to-peer (P2P) video streaming system. The metrics that we employ at each peer i...
Aditya Mavlankar, Pierpaolo Baccichet, Bernd Girod...
132
Voted
IEEEARES
2008
IEEE
15 years 9 months ago
Matching Policies with Security Claims of Mobile Applications
The Security-by-Contract (S×C) framework has been recently proposed to address the trust relationship problem of the current security model adopted for mobile devices. The key id...
Nataliia Bielova, Marco Dalla Torre, Nicola Dragon...
128
Voted
INFOCOM
2008
IEEE
15 years 9 months ago
Modeling the Evolution of Degree Correlation in Scale-Free Topology Generators
—In this paper, we examine the asymptotic behavior of degree correlation (i.e., the joint degree distribution of adjacent nodes) in several scale-free topology generators GED [13...
Xiaoming Wang, Xiliang Liu, Dmitri Loguinov
SEAA
2008
IEEE
15 years 9 months ago
Service Coroner: A Diagnostic Tool for Locating OSGi Stale References
The OSGi Services Platform provides a framework for the dynamic deployment of Java-based applications. It allows to install, to activate, to update and to uninstall application mo...
Kiev Gama, Didier Donsez
110
Voted
SP
2008
IEEE
144views Security Privacy» more  SP 2008»
15 years 9 months ago
Cloaker: Hardware Supported Rootkit Concealment
Rootkits are used by malicious attackers who desire to run software on a compromised machine without being detected. They have become stealthier over the years as a consequence of...
Francis M. David, Ellick Chan, Jeffrey C. Carlyle,...