Sciweavers

3022 search results - page 512 / 605
» Make Way for WayMaker
Sort
View
COMPUTER
2004
120views more  COMPUTER 2004»
13 years 10 months ago
Computer Security in the Real World
After thirty years of work on computer security, why are almost all the systems in service today extremely vulnerable to attack? The main reason is that security is expensive to s...
Butler W. Lampson
CN
2000
109views more  CN 2000»
13 years 10 months ago
On near-uniform URL sampling
We consider the problem of sampling URLs uniformly at random from the Web. A tool for sampling URLs uniformly can be used to estimate various properties of Web pages, such as the ...
Monika Rauch Henzinger, Allan Heydon, Michael Mitz...
COMPUTER
2000
128views more  COMPUTER 2000»
13 years 10 months ago
What's Ahead for Embedded Software?
hysical world. How do you adapt software abstractions designed merely to transform data to meet requirements like real-time constraints, concurrency, and stringent safety considera...
Edward A. Lee
CSUR
2000
136views more  CSUR 2000»
13 years 10 months ago
Pattern density and role modeling of an object transport service
Many object-oriented frameworks exhibit a high density of design pattern applications. Usually, there are more instances in a framework than there are abstract classes. Yet, only ...
Dirk Riehle, Roger Brudermann, Thomas R. Gross, Ka...
CORR
2007
Springer
126views Education» more  CORR 2007»
13 years 10 months ago
The effect of fading, channel inversion, and threshold scheduling on ad hoc networks
—This paper addresses three issues in the field of ad hoc network capacity: the impact of i) channel fading, ii) channel inversion power control, and iii) threshold–based sche...
Steven Weber, Jeffrey G. Andrews, Nihar Jindal