Sciweavers

5386 search results - page 1030 / 1078
» Approaches to Multimedia and Security
Sort
View
ATAL
2011
Springer
13 years 10 months ago
Maximizing revenue in symmetric resource allocation systems when user utilities exhibit diminishing returns
Consumers of resources in realistic applications (e.g., web, multimedia) typically derive diminishing-return utilities from the amount of resource they receive. A resource provide...
Roie Zivan, Miroslav Dudík, Praveen Paruchu...
EMSOFT
2011
Springer
13 years 9 months ago
Aciom: application characteristics-aware disk and network i/o management on android platform
The last several years have seen a rapid increase in smart phone use. Android offers an open-source software platform on smart phones, that includes a Linux-based kernel, Java app...
Hyosu Kim, Minsub Lee, Wookhyun Han, Kilho Lee, In...
ICSE
2008
IEEE-ACM
15 years 10 months ago
Static detection of cross-site scripting vulnerabilities
Web applications support many of our daily activities, but they often have security problems, and their accessibility makes them easy to exploit. In cross-site scripting (XSS), an...
Gary Wassermann, Zhendong Su
MOBISYS
2008
ACM
15 years 9 months ago
Flashproxy: transparently enabling rich web content via remote execution
It is now common for Web sites to use active Web content, such as Flash, Silverlight, or Java applets, to support rich, interactive applications. For many mobile devices, however,...
Alexander Moshchuk, Steven D. Gribble, Henry M. Le...
ICDCS
2008
IEEE
15 years 4 months ago
Toward Predictive Failure Management for Distributed Stream Processing Systems
Distributed stream processing systems (DSPSs) have many important applications such as sensor data analysis, network security, and business intelligence. Failure management is ess...
Xiaohui Gu, Spiros Papadimitriou, Philip S. Yu, Sh...
« Prev « First page 1030 / 1078 Last » Next »