Sciweavers

ITCC
2005
IEEE
14 years 5 months ago
StackOFFence: A Technique for Defending Against Buffer Overflow Attacks
Bharat B. Madan, Shashi Phoha, Kishor S. Trivedi
ITCC
2005
IEEE
14 years 5 months ago
Analyzing Relations among Software Patterns based on Document Similarity
In software development, many kinds of knowledge are shared and reused as software patterns. Howevel; the relation analysis among software by hand is on the large scale. In this w...
Atsuto Kubo, Hironori Washizaki, Atsuhiro Takasu, ...
ITCC
2005
IEEE
14 years 5 months ago
Application of Loop Reduction to Learning Program Behaviors for Anomaly Detection
Abstract: Evidence of some attacks can be manifested by abnormal sequences of system calls of programs. Most approaches that have been developed so far mainly concentrate on some p...
Jidong Long, Daniel G. Schwartz, Sara Stoecklin, M...
ITCC
2005
IEEE
14 years 5 months ago
Research on DRM-Enabled Learning Objects Model
The paper mainly discusses the DRM-enabled learning object model. Firstly, it analyses the art-of-status of Intellectual Property Rights in e-learning. Secondly, according to appl...
Qingtang Liu, Zongkai Yang, Kun Yan, Jing Jin, Wan...
ITCC
2005
IEEE
14 years 5 months ago
Impact of Java Compressed Heap on Mobile/Wireless Communication
M-commerce has shown up as e-commerce in mobile and wireless communication, and now deals with on-line banking, stock trading, auctions, transactions, and mobile media. M-commerce...
Mayumi Kato, Chia-Tien Dan Lo
ITCC
2005
IEEE
14 years 5 months ago
An Ontology-enabled Service Oriented Architecture for Pervasive Computing
In this paper, we propose a new Ontology-enabled Service Oriented Architecture (OSOA) for Pervasive Computing that is built on Web Services architecture, and incorporates Universa...
Qun Ni, Morris Sloman
ITCC
2005
IEEE
14 years 5 months ago
Double Auction Protocols for Resource Allocation in Grids
In this paper we propose the double auction allocation model for grids, and three double auction protocols for resource allocation: Preston-McAfee Double Auction Protocol (PMDA), ...
Umesh Kant, Daniel Grosu
ITCC
2005
IEEE
14 years 5 months ago
A Scalable Generative Topographic Mapping for Sparse Data Sequences
We propose a novel, computationally efficient generative topographic model for inferring low dimensional representations of high dimensional data sets, designed to exploit data s...
Ata Kabán
ITCC
2005
IEEE
14 years 5 months ago
An Energy-Efficient Middleware for Supporting Multimedia Services in Mobile Grid Environments
In this paper, we present techniques for exploiting intermittently available resources in grid infrastructures to support QoS-based multimedia applications on mobile devices. Spec...
Yun Huang, Shivajit Mohapatra, Nalini Venkatasubra...