Sciweavers

2947 search results - page 504 / 590
» Analyzing Program Analyses
Sort
View
CCS
2003
ACM
15 years 4 months ago
Anomaly detection of web-based attacks
Web-based vulnerabilities represent a substantial portion of the security exposures of computer networks. In order to detect known web-based attacks, misuse detection systems are ...
Christopher Krügel, Giovanni Vigna
ICS
2003
Tsinghua U.
15 years 4 months ago
Selecting long atomic traces for high coverage
This paper performs a comprehensive investigation of dynamic selection for long atomic traces. It introduces a classification of trace selection methods and discusses existing and...
Roni Rosner, Micha Moffie, Yiannakis Sazeides, Ron...
82
Voted
IFIP
2003
Springer
15 years 4 months ago
Power-Saving in Wi-Fi Hotspots: An Analytical Study
Wi-Fi hotspots are one of the most promising scenarios for mobile computing. In this scenario, a very limiting factor is the scarcity of mobile-device energetic resources. Both har...
Giuseppe Anastasi, Marco Conti, Enrico Gregori, An...
IFIP
2003
Springer
15 years 4 months ago
Collaborative and Distributed Computation in Mesh-Like Wireless Sensor Arrays
Sensor networks are being used for implementation of a large number of applications involving distributed and collaborative computation. Extensive research has focused upon design ...
Mitali Singh, Viktor K. Prasanna, José D. P...
ISCA
2010
IEEE
189views Hardware» more  ISCA 2010»
15 years 4 months ago
RETCON: transactional repair without replay
Over the past decade there has been a surge of academic and industrial interest in optimistic concurrency, i.e. the speculative parallel execution of code regions that have the se...
Colin Blundell, Arun Raghavan, Milo M. K. Martin