Sciweavers

283 search results - page 8 / 57
» Exploiting Immunological Properties for Ubiquitous Computing...
Sort
View
ISICT
2003
13 years 9 months ago
Supporting complexity through (informational and physical) collaboration and modeling
Abstract: A vision of tools to support software development organizations in the process of development, maintenance and evolution of systems is presented. The envisioned tools see...
Daniel C. M. May, Bent Bruun Kristensen, Palle Now...
IJDE
2006
95views more  IJDE 2006»
13 years 7 months ago
Exploiting the Rootkit Paradox with Windows Memory Analysis
Rootkits are malicious programs that silently subvert an operating system to hide an intruder's activities. Although there are a number of tools designed to detect rootkits, ...
Jesse D. Kornblum
SIGCOMM
2012
ACM
11 years 10 months ago
RaptorStream: boosting mobile peer-to-peer streaming with raptor codes
As mobile devices and cellular networks become ubiquitous, first apps for popular P2P video streaming networks emerge. We have observed that when these applications operate in ce...
Philipp M. Eittenberger
APLAS
2006
ACM
14 years 1 months ago
Computational Secrecy by Typing for the Pi Calculus
We define and study a distributed cryptographic implementation for an asynchronous pi calculus. At the source level, we adapt simple type systems designed for establishing formal ...
Martín Abadi, Ricardo Corin, Cédric ...
HUC
2003
Springer
14 years 26 days ago
Finding a Place for UbiComp in the Home
The movement of design out of the workplace and into the home brings with it the need to develop new analytic concepts to consider how ubiquitous computing might relate to and supp...
Andy Crabtree, Tom Rodden, Terry Hemmings, Steve B...