Sciweavers

6147 search results - page 1227 / 1230
» Requirements, Architectures and Risks
Sort
View
EUROSYS
2011
ACM
12 years 11 months ago
Finding complex concurrency bugs in large multi-threaded applications
Parallel software is increasingly necessary to take advantage of multi-core architectures, but it is also prone to concurrency bugs which are particularly hard to avoid, find, an...
Pedro Fonseca, Cheng Li, Rodrigo Rodrigues
EUROSYS
2011
ACM
12 years 11 months ago
Keypad: an auditing file system for theft-prone devices
This paper presents Keypad, an auditing file system for theftprone devices, such as laptops and USB sticks. Keypad provides two important properties. First, Keypad supports fine...
Roxana Geambasu, John P. John, Steven D. Gribble, ...
NOSSDAV
2011
Springer
12 years 10 months ago
The impact of inter-layer network coding on the relative performance of MRC/MDC WiFi media delivery
A primary challenge in multicasting video in a wireless LAN is to deal with the client diversity – clients may have different channel characteristics and hence receive different...
Rohan Gandhi, Meilin Yang, Dimitrios Koutsonikolas...
SAC
2011
ACM
12 years 10 months ago
Cloud application logging for forensics
Logs are one of the most important pieces of analytical data in a cloud-based service infrastructure. At any point in time, service owners and operators need to understand the sta...
Raffael Marty
GAMESEC
2011
287views Game Theory» more  GAMESEC 2011»
12 years 7 months ago
Collaborative Location Privacy with Rational Users
Recent smartphones incorporate embedded GPS devices that enable users to obtain geographic information about their surroundings by providing a location-based service (LBS) with the...
Francisco Santos, Mathias Humbert, Reza Shokri, Je...
« Prev « First page 1227 / 1230 Last » Next »