Sciweavers

1131 search results - page 109 / 227
» Performance analysis of BSTs in system software
Sort
View
117
Voted
EXPCS
2007
15 years 8 months ago
An analysis of XML compression efficiency
XML simplifies data exchange among heterogeneous computers, but it is notoriously verbose and has spawned the development of many XML-specific compressors and binary formats. We p...
Christopher J. Augeri, Dursun A. Bulutoglu, Barry ...
OSS
2007
Springer
15 years 10 months ago
From the Cathedral to the Bazaar: An Empirical Study of the Lifecycle of Volunteer Community Projects
Some free software and open source projects have been extremely successful in the past. The success of a project is often related to the number of developers it can attract: a larg...
Andrea Capiluppi, Martin Michlmayr
VEE
2012
ACM
238views Virtualization» more  VEE 2012»
13 years 11 months ago
Replacement attacks against VM-protected applications
Process-level virtualization is increasingly being used to enhance the security of software applications from reverse engineering and unauthorized modification (called software p...
Sudeep Ghosh, Jason Hiser, Jack W. Davidson
LCTRTS
2007
Springer
15 years 10 months ago
Combining source-to-source transformations and processor instruction set extensions for the automated design-space exploration o
Industry’s demand for flexible embedded solutions providing high performance and short time-to-market has led to the development of configurable and extensible processors. The...
Richard Vincent Bennett, Alastair Colin Murray, Bj...
KBSE
2005
IEEE
15 years 9 months ago
Designing and implementing a family of intrusion detection systems
Intrusion detection systems are distributed applications that analyze the events in a networked system to identify malicious behavior. The analysis is performed using a number of ...
Richard A. Kemmerer