Sciweavers

58 search results - page 10 / 12
» Requirements in the wild: How small companies do it
Sort
View
VIS
2009
IEEE
150views Visualization» more  VIS 2009»
14 years 8 months ago
VisMashup: Streamlining the Creation of Custom Visualization Applications
Visualization is essential for understanding the increasing volumes of digital data. However, the process required to create insightful visualizations is involved and time consumin...
Emanuele Santos, Lauro Lins, James P. Ahrens, J...
CC
2009
Springer
141views System Software» more  CC 2009»
14 years 7 months ago
Compile-Time Analysis and Specialization of Clocks in Concurrent Programs
Abstract. Clocks are a mechanism for providing synchronization barriers in concurrent programming languages. They are usually implemented using primitive communication mechanisms a...
Nalini Vasudevan, Olivier Tardieu, Julian Dolby, S...
ICICS
2007
Springer
14 years 1 months ago
Drive-By Pharming
Inexpensive broadband routers are a popular way for people to create an internal, and sometimes wireless, network in their homes. By purchasing such a router and plugging it in, t...
Sid Stamm, Zulfikar Ramzan, Markus Jakobsson
WDAG
2004
Springer
144views Algorithms» more  WDAG 2004»
14 years 13 days ago
Contention-Free MAC Protocols for Wireless Sensor Networks
Abstract. A MAC protocol specifies how nodes in a sensor network access a shared communication channel. Desired properties of such MAC protocol are: it should be distributed and c...
Costas Busch, Malik Magdon-Ismail, Fikret Sivrikay...
SIGCOMM
2006
ACM
14 years 1 months ago
Detecting evasion attacks at high speeds without reassembly
Ptacek and Newsham [14] showed how to evade signature detection at Intrusion Prevention Systems (IPS) using TCP and IP Fragmentation. These attacks are implemented in tools like F...
George Varghese, J. Andrew Fingerhut, Flavio Bonom...