Sciweavers

579 search results - page 100 / 116
» Intersecting Classes and Prototypes
Sort
View
152
Voted
EUROPKI
2009
Springer
15 years 12 days ago
ABUSE: PKI for Real-World Email Trust
Current PKI-based email systems (such as X.509 S/MIME and PGP/ MIME) potentially enable a recipient to determine a name and organizational affiliation of the sender. This informati...
Chris Masone, Sean W. Smith
127
Voted
ICSE
2009
IEEE-ACM
15 years 10 days ago
CocoViz with ambient audio software exploration
For ages we used our ears side by side with our ophthalmic stimuli to gather additional information, leading and supporting us in our visualization. Nowadays numerous software vis...
Sandro Boccuzzo, Harald Gall
ASPLOS
2009
ACM
16 years 3 months ago
ASSURE: automatic software self-healing using rescue points
Software failures in server applications are a significant problem for preserving system availability. We present ASSURE, a system that introduces rescue points that recover softw...
Stelios Sidiroglou, Oren Laadan, Carlos Perez, Nic...
102
Voted
IEEEPACT
2009
IEEE
15 years 9 months ago
Quantifying the Potential of Program Analysis Peripherals
Abstract—As programmers are asked to manage more complicated parallel machines, it is likely that they will become increasingly dependent on tools such as multi-threaded data rac...
Mohit Tiwari, Shashidhar Mysore, Timothy Sherwood
154
Voted
WOWMOM
2005
ACM
129views Multimedia» more  WOWMOM 2005»
15 years 8 months ago
The Wireless Hierarchical Token Bucket: A Channel Aware Scheduler for 802.11 Networks
The paper proposes an architecture for a scheduling algorithm, to be integrated in IEEE 802.11 Access Points (AP), able to take into account, besides the transport service class r...
Rosario Giuseppe Garroppo, Stefano Giordano, Stefa...