Sciweavers

640 search results - page 102 / 128
» Access Control for Active Spaces
Sort
View
118
Voted
SIGSOFT
2004
ACM
16 years 1 months ago
Testing static analysis tools using exploitable buffer overflows from open source code
Five modern static analysis tools (ARCHER, BOON, PolySpace C Verifier, Splint, and UNO) were evaluated using source code examples containing 14 exploitable buffer overflow vulnera...
Misha Zitser, Richard Lippmann, Tim Leek
87
Voted
SAINT
2003
IEEE
15 years 6 months ago
JGN IPv6 Network
To cope with the various problems arising from Internet protocol such as scarcity of IP addresses in the Internet and increase in the number of paths, research and development has...
Kazumasa Kobayashi, Kazuhiko Nakamura, Hisayoshi H...
MSS
2000
IEEE
160views Hardware» more  MSS 2000»
15 years 5 months ago
Implementation of a Fault-Tolerant Real-Time Network-Attached Storage Device
Phoenix is a fault-tolerantreal-time network-attachedstorage device (NASD). Like other NASD architectures, Phoenix provides an object-based interface to data stored on network-att...
Ashish Raniwala, Srikant Sharma, Anindya Neogi, Tz...
WETICE
1997
IEEE
15 years 5 months ago
Capturing Geometry Rationale for Collaborative Design
When an artifact is designed the typical output consists of documents describing the final result of a long series of deliberations and tradeoffs by the participants of collaborat...
Mark Klein
119
Voted
VIS
2007
IEEE
181views Visualization» more  VIS 2007»
16 years 2 months ago
Shadow-Driven 4D Haptic Visualization
Just as we can work with two-dimensional floor plans to communicate 3D architectural design, we can exploit reduced-dimension shadows to manipulate the higher-dimensional objects ...
Hui Zhang, Andrew J. Hanson