Sciweavers

2261 search results - page 400 / 453
» Dynamic types for authentication
Sort
View
107
Voted
USS
2004
15 years 3 months ago
TIED, LibsafePlus: Tools for Runtime Buffer Overflow Protection
Buffer overflow exploits make use of the treatment of strings in C as character arrays rather than as first-class objects. Manipulation of arrays as pointers and primitive pointer...
Kumar Avijit, Prateek Gupta, Deepak Gupta
ATAL
2010
Springer
15 years 3 months ago
Scalable mechanism design for the procurement of services with uncertain durations
In this paper, we study a service procurement problem with uncertainty as to whether service providers are capable of completing a given task within a specified deadline. This typ...
Enrico Gerding, Sebastian Stein, Kate Larson, Alex...
MOBICOM
2010
ACM
15 years 2 months ago
Differential forms for target tracking and aggregate queries in distributed networks
Consider mobile targets moving in a plane and their movements being monitored by a network such as a field of sensors. We develop distributed algorithms for in-network tracking an...
Rik Sarkar, Jie Gao
ALIFE
2007
15 years 2 months ago
Synchronization Phenomena in Surface-Reaction Models of Protocells
A class of generic models of protocells is introduced, which are inspired by the “Los Alamos bug” is but which, due to their abstraction level, can be applied to a wider set o...
Roberto Serra, Timoteo Carletti, Irene Poli
137
Voted
BMCBI
2010
164views more  BMCBI 2010»
15 years 2 months ago
Investigating the validity of current network analysis on static conglomerate networks by protein network stratification
Background: A molecular network perspective forms the foundation of systems biology. A common practice in analyzing protein-protein interaction (PPI) networks is to perform networ...
Minlu Zhang, Long J. Lu