Sciweavers

1833 search results - page 284 / 367
» Mechanized Verification with Sharing
Sort
View
RSP
2003
IEEE
130views Control Systems» more  RSP 2003»
15 years 9 months ago
Contributions to middleware architectures to prototype distribution infrastructures
— Distributed applications require specific middleware support for semantics and run-time constraints for a wide range of hardware or software configurations. However, their fu...
Jérôme Hugues, Laurent Pautet, Fabric...
SRDS
2003
IEEE
15 years 9 months ago
Transparent Runtime Randomization for Security
A large class of security attacks exploit software implementation vulnerabilities such as unchecked buffers. This paper proposes Transparent Runtime Randomization (TRR), a general...
Jun Xu, Zbigniew Kalbarczyk, Ravishankar K. Iyer
ISLPED
2003
ACM
138views Hardware» more  ISLPED 2003»
15 years 9 months ago
An environmental energy harvesting framework for sensor networks
Energy constrained systems such as sensor networks can increase their usable lifetimes by extracting energy from their environment. However, environmental energy will typically no...
Aman Kansal, Mani B. Srivastava
IUI
2003
ACM
15 years 9 months ago
Sticky notes for the semantic web
Computer-based annotation is increasing in popularity as a mechanism for revising documents and sharing comments over the Internet. One reason behind this surge is that viewpoints...
David R. Karger, Boris Katz, Jimmy J. Lin, Dennis ...
SIGCOMM
2003
ACM
15 years 9 months ago
Making gnutella-like P2P systems scalable
Napster pioneered the idea of peer-to-peer file sharing, and supported it with a centralized file search facility. Subsequent P2P systems like Gnutella adopted decentralized sea...
Yatin Chawathe, Sylvia Ratnasamy, Lee Breslau, Nic...