Sciweavers

1368 search results - page 241 / 274
» Understanding Software Systems Using Reverse Engineering Tec...
Sort
View
NLDB
2001
Springer
15 years 6 months ago
"Where Are the Christmas Decorations?": A Memory Assistant for Storage Locations
At Hewlett-Packard Laboratories we want to know how inexpensive it can be to endow mobile personal assistants with the ability to speak naturally with their users. To this end, we ...
Lewis G. Creary, Michael VanHilst
EUROSYS
2008
ACM
15 years 11 months ago
Eudaemon: involuntary and on-demand emulation against zero-day exploits
Eudaemon is a technique that aims to blur the borders between protected and unprotected applications, and brings together honeypot technology and end-user intrusion detection and ...
Georgios Portokalidis, Herbert Bos
WWW
2005
ACM
16 years 3 months ago
An environment for collaborative content acquisition and editing by coordinated ubiquitous devices
Digital content is not only stored by servers on the Internet, but also on various embedded devices belonging to ubiquitous networks. In this paper, we propose a content processin...
Yutaka Kidawara, Tomoyuki Uchiyama, Katsumi Tanaka
WWW
2001
ACM
16 years 3 months ago
A Logic-based Framework for Mobile Intelligent Information Agents
Information agents are computational software systems that provides transparent access to many different information sources in the Internet, and to be able to retrieve, analyze, ...
Naoki Fukuta, Takayuki Ito, Toramatsu Shintani
IMC
2004
ACM
15 years 7 months ago
Introducing scalability in network measurement: toward 10 Gbps with commodity hardware
The capacity of today's network links, along with the heterogeneity of their traffic, is rapidly growing, more than the workstation’s processing power. This makes the task ...
Loris Degioanni, Gianluca Varenni