Sciweavers

1240 search results - page 221 / 248
» Improving Memory Management Security for C and C
Sort
View
MOBICOM
2005
ACM
14 years 1 months ago
Self-management in chaotic wireless deployments
Over the past few years, wireless networking technologies have made vast forays into our daily lives. Today, one can find 802.11 hardware and other personal wireless technology e...
Aditya Akella, Glenn Judd, Srinivasan Seshan, Pete...
CIA
2004
Springer
14 years 28 days ago
Agent's Multiple Inquiries for Enhancing the Partnership Formation Process
The concept of sequential two-sided search is widely used in partnerships formation applications in various domains. However, when considering the implementation of the method in M...
David Sarne, Sarit Kraus
EICS
2009
ACM
14 years 6 days ago
Adapting ubicomp software and its evaluation
We describe work in progress on tools and infrastructure to support adaptive component-based software for mobile devices— in our case, Apple iPhones. Our high level aim is ‘de...
Malcolm Hall, Marek Bell, Alistair Morrison, Stuar...
CCR
2010
105views more  CCR 2010»
13 years 7 months ago
Fostering IPv6 migration through network quality differentials
This paper develops a simple model that explores the extent to which differences in connectivity quality can be effective incentives (or disincentives) towards migrating to an IPv...
Roch Guérin, Kartik Hosanagar
IEEECIT
2010
IEEE
13 years 6 months ago
Introducing Hardware-in-Loop Concept to the Hardware/Software Co-design of Real-time Embedded Systems
—As the need for embedded systems to interact with other systems is growing fast, we see great opportunities in introducing the hardware-in-the-loop technique to the field of ha...
Dogan Fennibay, Arda Yurdakul, Alper Sen