Sciweavers

6300 search results - page 35 / 1260
» We have it easy, but do we have it right
Sort
View
SAC
2006
ACM
14 years 2 months ago
A posteriori defensive programming: an annotation toolkit for DoS-resistant component-based architectures
Denial-of-Service (DoS) attacks are a major concern for modern distributed applications. They exploit weakness in the software in order to make it unavailable to well-behaved user...
Valerio Schiavoni, Vivien Quéma
EMSOFT
2008
Springer
13 years 10 months ago
Volatiles are miscompiled, and what to do about it
C's volatile qualifier is intended to provide a reliable link between operations at the source-code level and operations at the memorysystem level. We tested thirteen product...
Eric Eide, John Regehr
IROS
2008
IEEE
91views Robotics» more  IROS 2008»
14 years 2 months ago
What do people expect from robots?
— The study presented in this paper explores people perception of robots, with a particular focus on domestic use. We addressed issues related to positive and negative attitudes ...
Céline Ray, Francesco Mondada, Roland Siegw...
ICMCS
1999
IEEE
135views Multimedia» more  ICMCS 1999»
14 years 25 days ago
Do Software Engineers Like Multimedia?
Multimedia is not a dream anymore. Nowadays we use images (e.g., GIF, JPEG, and BMP), videos (e.g., MPEG, AVI, and QuickTime), and sounds (e.g., MIDI and WAV) as well as alphanume...
Masahito Hirakawa
ICON
2007
IEEE
14 years 2 months ago
Lightweight Detection of DoS Attacks
Denial of Service (DoS) attacks have continued to evolve and they impact the availability of Internet infrastructure. Many researchers in the field of network security and system ...
Sirikarn Pukkawanna, Vasaka Visoottiviseth, Panita...