Sciweavers

291 search results - page 58 / 59
» Socially-Aware Network Design Games
Sort
View
ICSE
2000
IEEE-ACM
13 years 9 months ago
Software engineering for security: a roadmap
Is there such a thing anymore as a software system that doesn't need to be secure? Almost every softwarecontrolled system faces threats from potential adversaries, from Inter...
Premkumar T. Devanbu, Stuart G. Stubblebine
POPL
2008
ACM
14 years 5 months ago
Cryptographically sound implementations for typed information-flow security
In language-based security, confidentiality and integrity policies conveniently specify the permitted flows of information between different parts of a program with diverse levels...
Cédric Fournet, Tamara Rezk
MM
2005
ACM
118views Multimedia» more  MM 2005»
13 years 11 months ago
Supporting multi-party voice-over-IP services with peer-to-peer stream processing
Multi-party voice-over-IP (MVoIP) services provide economical and natural group communication mechanisms for many emerging applications such as on-line gaming, distance collaborat...
Xiaohui Gu, Zhen Wen, Philip S. Yu, Zon-Yin Shae
GECCO
2010
Springer
184views Optimization» more  GECCO 2010»
13 years 10 months ago
Transfer learning through indirect encoding
An important goal for the generative and developmental systems (GDS) community is to show that GDS approaches can compete with more mainstream approaches in machine learning (ML)....
Phillip Verbancsics, Kenneth O. Stanley
INFOCOM
1998
IEEE
13 years 9 months ago
TCP Behavior of a Busy Internet Server: Analysis and Improvements
The rapid growth of the World Wide Web in recent years has caused a significant shift in the composition of Internet traffic. Although past work has studied the behavior of TCP dy...
Hari Balakrishnan, Venkata N. Padmanabhan, Sriniva...