Sciweavers

381 search results - page 54 / 77
» host 2008
Sort
View
IEEEARES
2008
IEEE
14 years 2 months ago
Type and Effect Annotations for Safe Memory Access in C
In this paper, we present a novel type and effect analysis for detecting memory errors in C source code. We extend the standard C type system with effect, region, and host annotat...
Syrine Tlili, Mourad Debbabi
INFOCOM
2008
IEEE
14 years 2 months ago
Non-Metric Coordinates for Predicting Network Proximity
—We consider the problem of determining the “closest”, or best Internet host to connect to, from a list of candidate servers. Most existing approaches rely on the use of metr...
Peter B. Key, Laurent Massoulié, Dan-Cristi...
INFOCOM
2008
IEEE
14 years 2 months ago
Spatial-Temporal Characteristics of Internet Malicious Sources
—This paper presents a large scale longitudinal study of the spatial and temporal features of malicious source addresses. The basis of our study is a 402-day trace of over 7 bill...
Zesheng Chen, Chuanyi Ji, Paul Barford
IROS
2008
IEEE
108views Robotics» more  IROS 2008»
14 years 2 months ago
Synchronous imitation control for biped robot based on wearable human motion analysis system
— To achieve accurate and efficient interaction with humans, robot training is indispensable to make robot cooperate with different host. We are focusing on development of a huma...
Tao Liu, H. Utsunomiya, Yoshio Inoue, Kyoko Shibat...
ISM
2008
IEEE
176views Multimedia» more  ISM 2008»
14 years 2 months ago
BitTube: Case Study of a Web-Based Peer-Assisted Video-on-Demand System
Recent theoretical and simulation-based studies have confirmed the tremendous benefit of peer-to-peer (P2P) communication at reducing the cost of running a VoD service. To date,...
Bo Liu, Yi Cui, Bin Chang, Ben Gotow, Yuan Xue