Sciweavers

2763 search results - page 133 / 553
» The Dangerous 'All' in Specifications
Sort
View
IS
2008
13 years 9 months ago
Joining the results of heterogeneous search engines
In recent years, while search engines have become more and more powerful, several specialized search engines have been developed for different domains (e.g. library services, serv...
Daniele Braga, Alessandro Campi, Stefano Ceri, Ale...
ISI
2006
Springer
13 years 9 months ago
Database Security Protection Via Inference Detection
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
Yu Chen, Wesley W. Chu
JNW
2008
139views more  JNW 2008»
13 years 9 months ago
Large-Scale RTCP Feedback Optimization
Nowadays, multimedia streaming is a common service on the Internet including both fixed and mobile networks. The RTP protocol is usually used to transfer the media. The RTCP protoc...
Vit Novotny, Dan Komosny
JSAC
2008
110views more  JSAC 2008»
13 years 9 months ago
Designing Multicast Protocols for Non-Cooperative Networks
Conventionally, most network protocols assume that the network entities who participate in the network activities will always behave as instructed. However, in practice, most netwo...
Weizhao Wang, Xiang-Yang Li, Yu Wang 0003, Zheng S...
SAC
2006
ACM
13 years 9 months ago
A new method of generating synchronizable test sequences that detect output-shifting faults based on multiple UIO sequences
The objective of testing is to determine the conformance between a system and its specification. When testing distributed systems, the existence of multiple testers brings out the...
Kai Chen, Fan Jiang, Chuan-dong Huang