Sciweavers

1092 search results - page 59 / 219
» Located Operators
Sort
View
OSDI
2006
ACM
14 years 10 months ago
Securing Software by Enforcing Data-flow Integrity
Software attacks often subvert the intended data-flow in a vulnerable program. For example, attackers exploit buffer overflows and format string vulnerabilities to write data to u...
Manuel Costa, Miguel Castro, Timothy L. Harris
IEEEARES
2008
IEEE
14 years 4 months ago
Application-Oriented Trust in Distributed Computing
Preserving integrity of applications being executed in remote machines is an open problem. Integrity requires that application code is not tampered with, prior to or during execut...
Riccardo Scandariato, Yoram Ofek, Paolo Falcarin, ...
GECCO
2007
Springer
157views Optimization» more  GECCO 2007»
14 years 4 months ago
Global multiobjective optimization via estimation of distribution algorithm with biased initialization and crossover
Multiobjective optimization problems with many local Pareto fronts is a big challenge to evolutionary algorithms. In this paper, two operators, biased initialization and biased cr...
Aimin Zhou, Qingfu Zhang, Yaochu Jin, Bernhard Sen...
INFOCOM
2006
IEEE
14 years 4 months ago
Resource Aware Middleware Services Over MANETs
— In emergency and rescue operations MANETs can help to increase the efficiency of the collaborative work. The goal is to increase the availability of services and information t...
Ovidiu Valentin Drugan, Thomas Plagemann, Ellen Mu...
VLDB
2005
ACM
110views Database» more  VLDB 2005»
14 years 3 months ago
U-DBMS: A Database System for Managing Constantly-Evolving Data
In many systems, sensors are used to acquire information from external environments such as temperature, pressure and locations. Due to continuous changes in these values, and lim...
Reynold Cheng, Sarvjeet Singh, Sunil Prabhakar