Sciweavers

3487 search results - page 627 / 698
» The Virtual Design Team
Sort
View
112
Voted
USITS
2001
15 years 4 months ago
Alpine: A User-Level Infrastructure for Network Protocol Development
In traditional operating systems, modifying the network protocol code is a tedious and error-prone task, largely because the networking stack resides in the kernel. For this reaso...
David Ely, Stefan Savage, David Wetherall
122
Voted
USENIX
2004
15 years 4 months ago
C-JDBC: Flexible Database Clustering Middleware
Large web or e-commerce sites are frequently hosted on clusters. Successful open-source tools exist for clustering the front tiers of such sites (web servers and application serve...
Emmanuel Cecchet, Julie Marguerite, Willy Zwaenepo...
144
Voted
VISSYM
2004
15 years 4 months ago
Medical Applications of Multi-field Volume Rendering and VR Techniques
This paper reports on a new approach for visualizing multi-field MRI or CT datasets in an immersive environment with medical applications. Multi-field datasets combine multiple sc...
Joe Kniss, Jürgen P. Schulze, Uwe Wössne...
125
Voted
IQ
2003
15 years 4 months ago
ClueMaker: A Language for Approximate Record Matching
We introduce ClueMaker, the first language designed specifically for approximate record matching. Clues written in ClueMaker predict whether two records denote the same thing based...
Martin Buechi, Andrew Borthwick, Adam Winkel, Arth...
137
Voted
WORM
2003
15 years 4 months ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...