Sciweavers

1358 search results - page 105 / 272
» Mapping Accessibility Over Time
Sort
View
ACSAC
2010
IEEE
13 years 1 months ago
A quantitative analysis of the insecurity of embedded network devices: results of a wide-area scan
We present a quantitative lower bound on the number of vulnerable embedded device on a global scale. Over the past year, we have systematically scanned large portions of the inter...
Ang Cui, Salvatore J. Stolfo
MIDDLEWARE
2007
Springer
14 years 4 months ago
New Worker-Centric Scheduling Strategies for Data-Intensive Grid Applications
Distributed computations, dealing with large amounts of data, are scheduled in Grid clusters today using either a task-centric mechanism, or a worker-centric mechanism. Because of ...
Steven Y. Ko, Ramsés Morales, Indranil Gupt...
QOFIS
2004
Springer
14 years 3 months ago
Load Analysis of Topology-Unaware TDMA MAC Policies for Ad Hoc Networks
Medium Access Control (MAC) policies in which the scheduling time slots are allocated irrespectively of the underline topology are suitable for ad-hoc networks, where nodes can ent...
Konstantinos Oikonomou, Ioannis Stavrakakis
ITC
2000
IEEE
124views Hardware» more  ITC 2000»
14 years 2 months ago
Wrapper design for embedded core test
A wrapper is a thin shell around the core, that provides the switching between functional, and core-internal and core-external test modes. Together with a test access mechanism (T...
Yervant Zorian, Erik Jan Marinissen, Maurice Lousb...
IJCAI
1997
13 years 11 months ago
Adaptive Web Sites: an AI Challenge
The creation of a complex web site is a thorny problem in user interface design. First, di erent visitors have distinct goals. Second, even a single visitor may have di erent need...
Mike Perkowitz, Oren Etzioni