Sciweavers

3895 search results - page 754 / 779
» Measuring the effectiveness of ACATS
Sort
View
SENSYS
2009
ACM
14 years 4 months ago
Evaluating a BASIC approach to sensor network node programming
Sensor networks have the potential to empower domain experts from a wide range of fields. However, presently they are notoriously difficult for these domain experts to program, ...
J. Scott Miller, Peter A. Dinda, Robert P. Dick
VEE
2009
ACM
171views Virtualization» more  VEE 2009»
14 years 4 months ago
Dynamic memory balancing for virtual machines
Virtualization essentially enables multiple operating systems and applications to run on one physical computer by multiplexing hardware resources. A key motivation for applying vi...
Weiming Zhao, Zhenlin Wang
CCS
2009
ACM
14 years 4 months ago
Ripley: automatically securing web 2.0 applications through replicated execution
Rich Internet applications are becoming increasingly distributed, as demonstrated by the popularity of AJAX or Web 2.0 applications such as Facebook, Google Maps, Hotmail and many...
K. Vikram, Abhishek Prateek, V. Benjamin Livshits
CCS
2009
ACM
14 years 4 months ago
Secure open source collaboration: an empirical study of linus' law
Open source software is often considered to be secure. One factor in this confidence in the security of open source software lies in leveraging large developer communities to find...
Andrew Meneely, Laurie A. Williams
ICC
2009
IEEE
112views Communications» more  ICC 2009»
14 years 4 months ago
Push Popular Segments in P2P VoD System: Possibility and Design
—Video-on-Demand (VoD) services have attracted a lot of attentions in recent years. Measurement studies show that VCR (Video Cassette Recorder) operations, such as pause, rewind,...
Junfeng Xie, Edward Chan, Guihai Chen, Yang Guo