Sciweavers

11653 search results - page 2197 / 2331
» The Development of the C Language
Sort
View
SIGCOMM
2005
ACM
14 years 4 months ago
On the predictability of large transfer TCP throughput
Predicting the throughput of large TCP transfers is important for a broad class of applications. This paper focuses on the design, empirical evaluation, and analysis of TCP throug...
Qi He, Constantinos Dovrolis, Mostafa H. Ammar
VRST
2005
ACM
14 years 4 months ago
AMMP-Vis: a collaborative virtual environment for molecular modeling
Molecular modeling is an important research area, helping scientists develop new drugs against diseases such as AIDS and cancer. Prior studies have demonstrated that immersive vir...
Jeffrey W. Chastine, Jeremy C. Brooks, Ying Zhu, G...
WS
2005
ACM
14 years 4 months ago
Hotspot-based traceback for mobile ad hoc networks
Traceback schemes are useful to identify the source of an attack. Existing traceback systems are not suitable for Mobile Ad Hoc Networks (MANET) because they rely on assumptions s...
Yi-an Huang, Wenke Lee
CCS
2005
ACM
14 years 4 months ago
Automatic diagnosis and response to memory corruption vulnerabilities
Cyber attacks against networked computers have become relentless in recent years. The most common attack method is to exploit memory corruption vulnerabilities such as buffer ove...
Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Chris...
ECMDAFA
2005
Springer
130views Hardware» more  ECMDAFA 2005»
14 years 3 months ago
Control Flow Analysis of UML 2.0 Sequence Diagrams
This article presents a control flow analysis methodology based on UML 2.0 sequence diagrams (SD). In contrast to the conventional code-based control flow analysis techniques, thi...
Vahid Garousi, Lionel C. Briand, Yvan Labiche
« Prev « First page 2197 / 2331 Last » Next »