Sciweavers

1727 search results - page 328 / 346
» Petascale System Management Experiences
Sort
View
ACSAC
2010
IEEE
13 years 5 months ago
Heap Taichi: exploiting memory allocation granularity in heap-spraying attacks
Heap spraying is an attack technique commonly used in hijacking browsers to download and execute malicious code. In this attack, attackers first fill a large portion of the victim...
Yu Ding, Tao Wei, Tielei Wang, Zhenkai Liang, Wei ...
WWW
2011
ACM
13 years 3 months ago
Rewriting queries on SPARQL views
The problem of answering SPARQL queries over virtual SPARQL views is commonly encountered in a number of settings, including while enforcing security policies to access RDF data, ...
Wangchao Le, Songyun Duan, Anastasios Kementsietsi...
INFOCOM
2011
IEEE
13 years 2 days ago
BodyT2: Throughput and time delay performance assurance for heterogeneous BSNs
—Body sensor networks (BSNs) have been developed for a set of performance-critical applications, including smart healthcare, assisted living, emergency response, athletic perform...
Zhen Ren, Gang Zhou, Andrew Pyles, Matthew Keally,...
SIGIR
1997
ACM
14 years 25 days ago
Learning Routing Queries in a Query Zone
Word usage is domain dependent. A common word in one domain can be quite infrequent in another. In this study we exploit this property of word usage to improve document routing. W...
Amit Singhal, Mandar Mitra, Chris Buckley
SIGUCCS
1998
ACM
14 years 26 days ago
The ResNet Obstacle Course
There are many ways to train student employees, but hands-on experience is invaluable. To provide our Resident Computer Consultants (RCCs) with the experience they need to solve t...
Kathleen A. Hausmann