Sciweavers

18209 search results - page 3593 / 3642
» Some Remarks on the Paper
Sort
View
WCRE
2010
IEEE
13 years 7 months ago
Predicting Re-opened Bugs: A Case Study on the Eclipse Project
—Bug fixing accounts for a large amount of the software maintenance resources. Generally, bugs are reported, fixed, verified and closed. However, in some cases bugs have to be...
Emad Shihab, Akinori Ihara, Yasutaka Kamei, Walid ...
WINET
2010
136views more  WINET 2010»
13 years 7 months ago
Analysis of the Bluetooth device discovery protocol
Device discovery and connection establishment are fundamental to communication between two Bluetooth (BT) devices. In this paper, we give an analytical model of the time it takes f...
Goutam Chakraborty, Kshirasagar Naik, Debasish Cha...
ACSAC
2010
IEEE
13 years 6 months ago
Fast and practical instruction-set randomization for commodity systems
Instruction-set randomization (ISR) is a technique based on randomizing the "language" understood by a system to protect it from code-injection attacks. Such attacks wer...
Georgios Portokalidis, Angelos D. Keromytis
ANCS
2010
ACM
13 years 6 months ago
A new TCB cache to efficiently manage TCP sessions for web servers
TCP/IP, the most commonly used network protocol, consumes a significant portion of time in Internet servers. While a wide spectrum of studies has been done to reduce its processin...
Guangdeng Liao, Laxmi N. Bhuyan, Wei Wu, Heeyeol Y...
CASCON
2010
174views Education» more  CASCON 2010»
13 years 6 months ago
Smart Services Across the Real and Virtual Worlds
Today, we are witnessing a new level of scale, complexity, and pervasiveness of software systems that are designed to support much more holistically complex processes. Much richer...
Eleni Stroulia
« Prev « First page 3593 / 3642 Last » Next »