Sciweavers

933 search results - page 161 / 187
» How compilers and tools differ for embedded systems
Sort
View
CSE
2009
IEEE
14 years 3 months ago
Social Inference Risk Modeling in Mobile and Social Applications
— The emphasis of emerging mobile and Web 2.0 applications on collaboration and communication increases threats to user privacy. A serious, yet under-researched privacy risk resu...
Sara Motahari, Sotirios G. Ziavras, Mor Naaman, Mo...
P2P
2007
IEEE
14 years 2 months ago
PEPINO: PEer-to-Peer network INspectOr
PEPINO is a simple and effective peer-to-peer network inspector. It visualises not only meaningful pointers and connections between peers, but also the exchange of messages betwee...
Donatien Grolaux, Boris Mejías, Peter Van R...
ICPADS
2005
IEEE
14 years 2 months ago
A Differentiated Message Delivery Architecture to Control Spam
Unsolicited bulk electronic mail (spam) is increasingly plaguing the Internet Email system and deteriorating its value as a convenient communication tools. In this paper we argue ...
Zhenhai Duan, Yingfei Dong, Kartik Gopalan
SIGSOFT
2005
ACM
14 years 2 months ago
Reuse and variability in large software applications
Reuse has always been a major goal in software engineering, since it promises large gains in productivity, quality and time to market reduction. Practical experience has shown tha...
Jacky Estublier, Germán Vega
CIA
2000
Springer
14 years 1 months ago
Applying Agents to Bioinformatics in GeneWeaver
Recent years have seen dramatic and sustained growth in the amount of genomic data being generated, including in late 1999 the first complete sequence of a human chromosome. The c...
Kevin Bryson, Michael Luck, Mike Joy, David T. Jon...