Sciweavers

7189 search results - page 1362 / 1438
» Connecting Design with Code
Sort
View
GD
2008
Springer
15 years 4 months ago
Graph Drawing for Security Visualization
Abstract. As the number of devices connected to the internet continues to grow rapidly and software systems are being increasingly deployed on the web, security and privacy have be...
Roberto Tamassia, Bernardo Palazzi, Charalampos Pa...
HASKELL
2008
ACM
15 years 4 months ago
Lightweight monadic regions
We present Haskell libraries that statically ensure the safe use of resources such as file handles. We statically prevent accessing an already closed handle or forgetting to clos...
Oleg Kiselyov, Chung-chieh Shan
MOBICOM
2010
ACM
15 years 3 months ago
Exploiting temporal stability and low-rank structure for localization in mobile networks
Localization is a fundamental operation for many wireless networks. While GPS is widely used for location determination, it is unavailable in many environments either due to its h...
Swati Rallapalli, Lili Qiu, Yin Zhang, Yi-Chao Che...
SIGCOMM
2010
ACM
15 years 3 months ago
Circumventing censorship with collage
Oppressive regimes and even democratic governments restrict Internet access. Existing anti-censorship systems often require users to connect through proxies, but these systems are...
Sam Burnett, Nick Feamster, Santosh Vempala
MM
2010
ACM
167views Multimedia» more  MM 2010»
15 years 3 months ago
Improving online gaming quality using detour paths
We study the problem of improving the user perceived quality of online games in which multiple players form a game session and exchange game-state updates over an overlay network....
Cong Ly, Cheng-Hsin Hsu, Mohamed Hefeeda
« Prev « First page 1362 / 1438 Last » Next »