Sciweavers

7741 search results - page 1450 / 1549
» Security in Active Networks
Sort
View
SIGCOMM
2012
ACM
13 years 6 months ago
Predicting location using mobile phone calls
Location prediction using mobile phone traces has attracted increasing attention. Owing to the irregular user mobility patterns, it still remains challenging to predict user locat...
Daqiang Zhang, Athanasios V. Vasilakos, Haoyi Xion...
INFOCOM
2012
IEEE
13 years 6 months ago
On superposition of heterogeneous edge processes in dynamic random graphs
—This paper builds a generic modeling framework for analyzing the edge-creation process in dynamic random graphs in which nodes continuously alternate between active and inactive...
Zhongmei Yao, Daren B. H. Cline, Dmitri Loguinov
WWW
2003
ACM
16 years 5 months ago
Evaluating SOAP for High Performance Business Applications: Real-Time Trading Systems
Web services, with an emphasis on open standards and flexibility, may provide benefits over existing capital markets integration practices. However, web services must first meet c...
Christopher Kohlhoff, Robert Steele
EUROSYS
2010
ACM
16 years 1 months ago
Reverse Engineering of Binary Device Drivers with RevNIC
This paper presents a technique that helps automate the reverse engineering of device drivers. It takes a closed-source binary driver, automatically reverse engineers the driverâ€...
Vitaly Chipounov, George Candea
FOCS
2009
IEEE
15 years 11 months ago
2-Source Extractors under Computational Assumptions and Cryptography with Defective Randomness
Abstract— We show how to efï¬ciently extract truly random bits from two independent sources of linear min-entropy, under a computational assumption. The assumption we rely on is...
Yael Tauman Kalai, Xin Li, Anup Rao
« Prev « First page 1450 / 1549 Last » Next »