Sciweavers

5838 search results - page 88 / 1168
» A File System for System Programming in Ubiquitous Computing
Sort
View
103
Voted
GECCO
2005
Springer
132views Optimization» more  GECCO 2005»
15 years 8 months ago
Evolving computer intrusion scripts for vulnerability assessment and log analysis
Evolutionary computation is used to construct undetectable computer attack scripts. Using a simulated operating system, we show that scripts can be evolved to cover their tracks a...
Julien Budynek, Eric Bonabeau, Ben Shargel
WISE
2010
Springer
15 years 1 months ago
The Ubiquitous DBMS
Advancement in mobile computing technologies has prompted strong needs for database systems that can be used in small devices such as sensors, cellular phones, PDAs, car navigator...
Kyu-Young Whang
JNW
2007
80views more  JNW 2007»
15 years 3 months ago
Providing Security Services in a Resource Discovery System
— Nowadays, portable electronic devices allow users to access available resources wherever they are. In this sense, announcement and discovering of services and resources are two...
Juan Vera del Campo, Josep Pegueroles, Miguel Sori...
PPOPP
2010
ACM
16 years 12 days ago
Structure-driven optimizations for amorphous data-parallel programs
Irregular algorithms are organized around pointer-based data structures such as graphs and trees, and they are ubiquitous in applications. Recent work by the Galois project has pr...
Mario Méndez-Lojo, Donald Nguyen, Dimitrios...
CONTEXT
2007
Springer
15 years 9 months ago
Delimited Continuations in Operating Systems
Abstract. Delimited continuations are the meanings of delimited evaluation contexts in programming languages. We show they offer a uniform view of many scenarios that arise in sys...
Oleg Kiselyov, Chung-chieh Shan