Sciweavers

1028 search results - page 171 / 206
» Using Attack Graphs to Design Systems
Sort
View
SEMWEB
2009
Springer
14 years 3 months ago
Functions over RDF Language Elements
Spreadsheet tools are often used in business and private scenarios in order to collect and store data, and to explore and analyze these data by executing functions and aggregation...
Bernhard Schandl
WWW
2009
ACM
14 years 9 months ago
Anycast-aware transport for content delivery networks
Anycast-based content delivery networks (CDNs) have many properties that make them ideal for the large scale distribution of content on the Internet. However, because routing chan...
Zakaria Al-Qudah, Seungjoon Lee, Michael Rabinovic...
ISCA
2009
IEEE
186views Hardware» more  ISCA 2009»
14 years 3 months ago
Application-aware deadlock-free oblivious routing
Conventional oblivious routing algorithms are either not application-aware or assume that each flow has its own private channel to ensure deadlock avoidance. We present a framewo...
Michel A. Kinsy, Myong Hyon Cho, Tina Wen, G. Edwa...
CDC
2009
IEEE
152views Control Systems» more  CDC 2009»
14 years 1 months ago
Distributed image-based 3-D localization of camera sensor networks
— We consider the problem of distributed estimation of the poses of N cameras in a camera sensor network using image measurements only. The relative rotation and translation (up ...
Roberto Tron, René Vidal
ECEASST
2010
13 years 6 months ago
GUI Inspection from Source Code Analysis
Abstract: Graphical user interfaces (GUIs) are critical components of todays software. Given their increased relevance, correctness and usability of GUIs are becoming essential. Th...
João Carlos Silva 0002, José Creissa...