Sciweavers

1636 search results - page 220 / 328
» From Usability Lab to
Sort
View
INFOCOM
2008
IEEE
14 years 3 months ago
Swarming on Optimized Graphs for n-Way Broadcast
—In an n-way broadcast application each one of n overlay nodes wants to push its own distinct large data file to all other n-1 destinations as well as download their respective ...
Georgios Smaragdakis, Azer Bestavros, Nikolaos Lao...
MICRO
2008
IEEE
103views Hardware» more  MICRO 2008»
14 years 3 months ago
Testudo: Heavyweight security analysis via statistical sampling
Heavyweight security analysis systems, such as taint analysis and dynamic type checking, are powerful technologies used to detect security vulnerabilities and software bugs. Tradi...
Joseph L. Greathouse, Ilya Wagner, David A. Ramos,...
ACSAC
2007
IEEE
14 years 3 months ago
SSARES: Secure Searchable Automated Remote Email Storage
The increasing centralization of networked services places user data at considerable risk. For example, many users store email on remote servers rather than on their local disk. D...
Adam J. Aviv, Michael E. Locasto, Shaya Potter, An...
CISS
2007
IEEE
14 years 3 months ago
Emitter Localization and Visualization (ELVIS): A Backward Ray Tracing Algorithm for Locating Emitters
— We present ELVIS, a new approach for localizing a first responder (e.g., firefighter) inside a building. We assume that the first responder emits RF energy, which undergoes...
Aliye Özge Kaya, Larry J. Greenstein, Dmitry ...
HPDC
2007
IEEE
14 years 3 months ago
IDEA: : an infrastructure for detection-based adaptive consistency control in replicated services
In Internet-scale distributed systems, replicationbased scheme has been widely deployed to increase the availability and efficiency of services. Hence, consistency maintenance amo...
Yijun Lu, Ying Lu, Hong Jiang