Sciweavers

3792 search results - page 657 / 759
» Techniques for Trusted Software Engineering
Sort
View
ACSAC
2010
IEEE
15 years 2 months ago
G-Free: defeating return-oriented programming through gadget-less binaries
Despite the numerous prevention and protection mechanisms that have been introduced into modern operating systems, the exploitation of memory corruption vulnerabilities still repr...
Kaan Onarlioglu, Leyla Bilge, Andrea Lanzi, Davide...
MOBIHOC
2010
ACM
15 years 2 months ago
Longest-queue-first scheduling under SINR interference model
We investigate the performance of longest-queue-first (LQF) scheduling (i.e., greedy maximal scheduling) for wireless networks under the SINR interference model. This interference...
Long Bao Le, Eytan Modiano, Changhee Joo, Ness B. ...
DLS
2009
150views Languages» more  DLS 2009»
15 years 2 months ago
Fast type reconstruction for dynamically typed programming languages
Type inference and type reconstruction derive static types for program elements that have no static type associated with them. They have a wide range of usage, such as helping to ...
Frédéric Pluquet, Antoine Marot, Roe...
CSCW
2011
ACM
14 years 11 months ago
It's about time: confronting latency in the development of groupware systems
The presence of network latency leads to usability problems in distributed groupware applications. Example problems include difficulty synchronizing tightly-coupled collaboration...
Cheryl Savery, T. C. Nicholas Graham
157
Voted
PE
2010
Springer
123views Optimization» more  PE 2010»
14 years 11 months ago
Evaluating fluid semantics for passive stochastic process algebra cooperation
Fluid modelling is a next-generation technique for analysing massive performance models. Passive cooperation is a popular cooperation mechanism frequently used by performance engi...
Richard A. Hayden, Jeremy T. Bradley