Sciweavers

15951 search results - page 3084 / 3191
» Lawful software engineering
Sort
View
COMSWARE
2006
IEEE
14 years 3 months ago
Resource management in heterogenous wireless networks with overlapping coverage
— Development in new radio technologies and increase in user demands are driving the deployment of a wide array of wireless networks, ranging from 802.11 networks in the local ar...
Bin Bin Chen, Mun Choon Chan
SKG
2006
IEEE
14 years 3 months ago
Mathematics Computing Environment on the Web
With the rapid evolution of web technology and Internet, the mathematical web has emerged as a new research trend, which changes the traditional manner of mathematical scientific ...
Li Liu, Yi Yang, Lian Li
ASPLOS
2006
ACM
14 years 3 months ago
Bell: bit-encoding online memory leak detection
Memory leaks compromise availability and security by crippling performance and crashing programs. Leaks are difficult to diagnose because they have no immediate symptoms. Online ...
Michael D. Bond, Kathryn S. McKinley
MM
2006
ACM
119views Multimedia» more  MM 2006»
14 years 3 months ago
Modelling dependency in multimedia streams
Expressing and analysing data dependency in multimedia streams is promising, since content-aware policies at a transport level would benefit from such services. In this paper we ...
Alexander Eichhorn
PLDI
2006
ACM
14 years 3 months ago
Combining type-based analysis and model checking for finding counterexamples against non-interference
Type systems for secure information flow are useful for efficiently checking that programs have secure information flow. They are, however, conservative, so that they often rej...
Hiroshi Unno, Naoki Kobayashi, Akinori Yonezawa
« Prev « First page 3084 / 3191 Last » Next »