Sciweavers

1413 search results - page 262 / 283
» ideas 2007
Sort
View
SOSP
2007
ACM
14 years 3 months ago
Triage: diagnosing production run failures at the user's site
Diagnosing production run failures is a challenging yet important task. Most previous work focuses on offsite diagnosis, i.e. development site diagnosis with the programmers prese...
Joseph Tucek, Shan Lu, Chengdu Huang, Spiros Xanth...
CTRSA
2009
Springer
151views Cryptology» more  CTRSA 2009»
14 years 1 months ago
Key-Private Proxy Re-encryption
Proxy re-encryption (PRE) allows a proxy to convert a ciphertext encrypted under one key into an encryption of the same message under another key. The main idea is to place as lit...
Giuseppe Ateniese, Karyn Benson, Susan Hohenberger
ACSAC
2007
IEEE
14 years 1 months ago
Limits of Static Analysis for Malware Detection
Malicious code is an increasingly important problem that threatens the security of computer systems. The traditional line of defense against malware is composed of malware detecto...
Andreas Moser, Christopher Kruegel, Engin Kirda
AINA
2007
IEEE
14 years 1 months ago
A Class-Based Search System in Unstructured P2P Networks
— Efficient searching is one of the important design issues in peer-to-peer (P2P) networks. Among various searching techniques, semantic-based searching has drawn significant a...
Juncheng Huang, Xiuqi Li, Jie Wu
AINA
2007
IEEE
14 years 1 months ago
An Application-Driven MAC-layer Buffer Management with Active Dropping for Real-time Video Streaming in 802.16 Networks
— In this paper, we propose an application-driven MAC-layer buffer management framework based on a novel Active Dropping (AD) mechanism for real-time video streaming in IEEE 802....
James She, Fen Hou, Pin-Han Ho