Sciweavers

4218 search results - page 272 / 844
» Complete sets of cooperations
Sort
View
115
Voted
EJC
2008
14 years 11 months ago
Locating sensors in paths and cycles: The case of 2-identifying codes
For a graph G and a set D V (G), define Nr[x] = {xi V (G) : d(x, xi) r} (where d(x, y) is graph theoretic distance) and Dr(x) = Nr[x] D. D is known as an r-identifying code if...
David L. Roberts, Fred S. Roberts
ISW
2010
Springer
14 years 10 months ago
An Architecture for Enforcing JavaScript Randomization in Web2.0 Applications
Abstract. Instruction Set Randomization (ISR) is a promising technique for preventing code-injection attacks. In this paper we present a complete randomization framework for JavaSc...
Elias Athanasopoulos, Antonis Krithinakis, Evangel...
111
Voted
ARC
2011
Springer
220views Hardware» more  ARC 2011»
14 years 7 months ago
From Plasma to BeeFarm: Design Experience of an FPGA-Based Multicore Prototype
Abstract. In this paper, we take a MIPS-based open-source uniprocessor soft core, Plasma, and extend it to obtain the Beefarm infrastructure for FPGA-based multiprocessor emulation...
Nehir Sönmez, Oriol Arcas, Gokhan Sayilar, Os...
151
Voted
FORTE
2011
14 years 4 months ago
On Global Types and Multi-party Sessions
We present a new, streamlined language of global types equipped with a trace-based semantics and whose features and restrictions are semantically justified. The multi-party sessio...
Giuseppe Castagna, Mariangiola Dezani-Ciancaglini,...
190
Voted
ICDT
2009
ACM
143views Database» more  ICDT 2009»
16 years 1 months ago
Automatic construction of simple artifact-based business processes
Almost all medium- and large-scale businesses rely on electronic workflow systems to manage their business processes. A key challenge is to enable the easy re-use and modification...
Christian Fritz, Richard Hull, Jianwen Su