Sciweavers

1240 search results - page 234 / 248
» Improving Memory Management Security for C and C
Sort
View
NETGAMES
2006
ACM
14 years 1 months ago
Cheat detection for MMORPG on P2P environments
In recent years, MMORPG has become popular. In order to improve scalability of game system, several P2P-based architectures have been proposed. However, in P2P-based gaming archit...
Takato Izaiku, Shinya Yamamoto, Yoshihiro Murata, ...
MSWIM
2009
ACM
14 years 2 months ago
The MAC unreliability problem in IEEE 802.15.4 wireless sensor networks
In recent years, the number of sensor network deployments for real-life applications has rapidly increased and it is expected to expand even more in the near future. Actually, for...
Giuseppe Anastasi, Marco Conti, Mario Di Francesco
ICRA
2009
IEEE
106views Robotics» more  ICRA 2009»
14 years 2 months ago
Simultaneous local and global state estimation for robotic navigation
— Recent applications of robotics often demand two types of spatial awareness: 1) A fine-grained description of the robot’s immediate surroundings for obstacle avoidance and p...
David C. Moore, Albert S. Huang, Matthew Walter, E...
SYSTOR
2009
ACM
14 years 2 months ago
DHIS: discriminating hierarchical storage
A typical storage hierarchy comprises of components with varying performance and cost characteristics, providing multiple options for data placement. We propose and evaluate a hie...
Chaitanya Yalamanchili, Kiron Vijayasankar, Erez Z...
ISESE
2006
IEEE
14 years 1 months ago
PBR vs. checklist: a replication in the n-fold inspection context
Inspection is considered a powerful method to check software documents for defects. Many published work shows that inspections in requirements specification phase are particularly...
Lulu He, Jeffrey C. Carver