Sciweavers

2261 search results - page 400 / 453
» Dynamic types for authentication
Sort
View
USS
2004
13 years 10 months ago
TIED, LibsafePlus: Tools for Runtime Buffer Overflow Protection
Buffer overflow exploits make use of the treatment of strings in C as character arrays rather than as first-class objects. Manipulation of arrays as pointers and primitive pointer...
Kumar Avijit, Prateek Gupta, Deepak Gupta
ATAL
2010
Springer
13 years 10 months ago
Scalable mechanism design for the procurement of services with uncertain durations
In this paper, we study a service procurement problem with uncertainty as to whether service providers are capable of completing a given task within a specified deadline. This typ...
Enrico Gerding, Sebastian Stein, Kate Larson, Alex...
MOBICOM
2010
ACM
13 years 9 months ago
Differential forms for target tracking and aggregate queries in distributed networks
Consider mobile targets moving in a plane and their movements being monitored by a network such as a field of sensors. We develop distributed algorithms for in-network tracking an...
Rik Sarkar, Jie Gao
ALIFE
2007
13 years 9 months ago
Synchronization Phenomena in Surface-Reaction Models of Protocells
A class of generic models of protocells is introduced, which are inspired by the “Los Alamos bug” is but which, due to their abstraction level, can be applied to a wider set o...
Roberto Serra, Timoteo Carletti, Irene Poli
BMCBI
2010
164views more  BMCBI 2010»
13 years 9 months ago
Investigating the validity of current network analysis on static conglomerate networks by protein network stratification
Background: A molecular network perspective forms the foundation of systems biology. A common practice in analyzing protein-protein interaction (PPI) networks is to perform networ...
Minlu Zhang, Long J. Lu