Sciweavers

67 search results - page 7 / 14
» Analyzing the Use of Quick Response Codes in the Wild
Sort
View
103
Voted
WWW
2011
ACM
14 years 5 months ago
Prophiler: a fast filter for the large-scale detection of malicious web pages
Malicious web pages that host drive-by-download exploits have become a popular means for compromising hosts on the Internet and, subsequently, for creating large-scale botnets. In...
Davide Canali, Marco Cova, Giovanni Vigna, Christo...
72
Voted
AINA
2006
IEEE
15 years 4 months ago
Effect of Redundancy on Mean Time to Failure of Wireless Sensor Networks
In query-based wireless sensor networks (WSNs), the system must perform data sensing and retrieval and possibly aggregate data as a response at runtime. Since a WSN is often deplo...
Anh Phan Speer, Ing-Ray Chen
SIGCOMM
2006
ACM
15 years 4 months ago
Growth codes: maximizing sensor network data persistence
Sensor networks are especially useful in catastrophic or emergency scenarios such as floods, fires, terrorist attacks or earthquakes where human participation may be too dangero...
Abhinav Kamra, Vishal Misra, Jon Feldman, Dan Rube...
97
Voted
MICRO
1991
IEEE
85views Hardware» more  MICRO 1991»
15 years 1 months ago
Comparing Static and Dynamic Code Scheduling for Multiple-Instruction-Issue Processors
This paper examines two alternative approaches to supporting code scheduling for multiple-instruction-issue processors. One is to provide a set of non-trapping instructions so tha...
Pohua P. Chang, William Y. Chen, Scott A. Mahlke, ...
88
Voted
MSR
2010
ACM
15 years 3 months ago
The evolution of ANT build systems
—Build systems are responsible for transforming static source code artifacts into executable software. While build systems play such a crucial role in software development and ma...
Shane McIntosh, Bram Adams, Ahmed E. Hassan