Sciweavers

11182 search results - page 1956 / 2237
» Shape Analysis of Sets
Sort
View
ACNS
2011
Springer
244views Cryptology» more  ACNS 2011»
14 years 8 months ago
Quantitatively Analyzing Stealthy Communication Channels
Abstract. Attackers in particular botnet controllers use stealthy messaging systems to set up large-scale command and control. Understanding the capacity of such communication chan...
Patrick Butler, Kui Xu, Danfeng (Daphne) Yao
CAV
2011
Springer
202views Hardware» more  CAV 2011»
14 years 8 months ago
Simplifying Loop Invariant Generation Using Splitter Predicates
Abstract. We present a novel static analysis technique that substantially improves the quality of invariants inferred by standard loop invariant generation techniques. Our techniqu...
Rahul Sharma 0001, Isil Dillig, Thomas Dillig, Ale...
CICLING
2011
Springer
14 years 8 months ago
Wikipedia Vandalism Detection: Combining Natural Language, Metadata, and Reputation Features
Wikipedia is an online encyclopedia which anyone can edit. While most edits are constructive, about 7% are acts of vandalism. Such behavior is characterized by modifications made ...
B. Thomas Adler, Luca de Alfaro, Santiago Mois&eac...
CSCW
2011
ACM
14 years 8 months ago
Browse and discover: social file sharing in the enterprise
There is a growth in the popularity of social file sharing systems. This paper describes the design of Cattail, a social file sharing system for the enterprise. Through a ‘Recen...
N. Sadat Shami, Michael J. Muller, David R. Millen
INFOCOM
2011
IEEE
14 years 8 months ago
Connected coverage in wireless networks with directional antennas
—In this paper, we address a new unexplored problem - what are the optimal patterns to achieve connected coverage in wireless networks with directional antennas. As their name im...
Zuoming Yu, Jin Teng, Xiaole Bai, Dong Xuan, Weiji...
« Prev « First page 1956 / 2237 Last » Next »