Sciweavers

674 search results - page 108 / 135
» Telephony in the Year 2005
Sort
View
RTAS
2009
IEEE
14 years 4 months ago
Lightweight Modeling of Complex State Dependencies in Stream Processing Systems
Over the last few years, Real-Time Calculus has been used extensively to model and analyze embedded systems processing continuous data/event streams. Towards this, bounds on the a...
Anne Bouillard, Linh T. X. Phan, Samarjit Chakrabo...
WIKIS
2009
ACM
14 years 4 months ago
Organizing the vision for web 2.0: a study of the evolution of the concept in Wikipedia
Information Systems (IS) innovations are often characterized by buzzwords, reflecting organizing visions that structure and express the images and ideas formed by a wide community...
Arnaud Gorgeon, E. Burton Swanson
INFOCOM
2007
IEEE
14 years 4 months ago
Analysis of the Reliability of a Nationwide Short Message Service
—SMS has been arguably the most popular wireless data service for cellular networks. Due to its ubiquitous availability and universal support by mobile handsets and cellular carr...
Xiaoqiao Meng, Petros Zerfos, Vidyut Samanta, Star...
ACSAC
2005
IEEE
14 years 3 months ago
Automated and Safe Vulnerability Assessment
As the number of system vulnerabilities multiplies in recent years, vulnerability assessment has emerged as a powerful system security administration tool that can identify vulner...
Fanglu Guo, Yang Yu, Tzi-cker Chiueh
ACSAC
2005
IEEE
14 years 3 months ago
Multi-Level Security Requirements for Hypervisors
Using hypervisors or virtual machine monitors for security has become very popular in recent years, and a number of proposals have been made for supporting multi-level security on...
Paul A. Karger