Sciweavers

1191 search results - page 238 / 239
» Compute the Term Contributed Frequency
Sort
View
CCS
2010
ACM
13 years 6 months ago
BLADE: an attack-agnostic approach for preventing drive-by malware infections
Web-based surreptitious malware infections (i.e., drive-by downloads) have become the primary method used to deliver malicious software onto computers across the Internet. To addr...
Long Lu, Vinod Yegneswaran, Phillip A. Porras, Wen...
MMS
2010
13 years 4 months ago
Gaming on the move: urban experience as a new paradigm for mobile pervasive game design
In this paper, we describe a pervasive treasure hunting game: “Team exploration” based on the Transhumance ad hoc wifi platform. The testers of this game came up with innovati...
Annie Gentes, Aude Guyot-Mbodji, Isabelle M. Demeu...
SIGSOFT
2010
ACM
13 years 3 months ago
Scalable SMT-based verification of GPU kernel functions
Interest in Graphical Processing Units (GPUs) is skyrocketing due to their potential to yield spectacular performance on many important computing applications. Unfortunately, writ...
Guodong Li, Ganesh Gopalakrishnan
SENSYS
2010
ACM
13 years 3 months ago
Surviving wi-fi interference in low power ZigBee networks
Frequency overlap across wireless networks with different radio technologies can cause severe interference and reduce communication reliability. The circumstances are particularly...
Chieh-Jan Mike Liang, Bodhi Priyantha, Jie Liu, An...
PODC
2010
ACM
13 years 10 months ago
The multiplicative power of consensus numbers
: The Borowsky-Gafni (BG) simulation algorithm is a powerful reduction algorithm that shows that t-resilience of decision tasks can be fully characterized in terms of wait-freedom....
Damien Imbs, Michel Raynal