Sciweavers

14078 search results - page 2414 / 2816
» Design and Analysis of Computer Algorithms
Sort
View
DIALM
2003
ACM
175views Algorithms» more  DIALM 2003»
15 years 10 months ago
Localized construction of bounded degree and planar spanner for wireless ad hoc networks
We propose a novel localized algorithm that constructs a bounded degree and planar spanner for wireless ad hoc networks modeled by unit disk graph (UDG). Every node only has to kn...
Yu Wang 0003, Xiang-Yang Li

Publication
255views
17 years 3 months ago
Buffer Management and Rate Guarantees for TCP/IP over Satellite-ATM Networks
Future broadband satellite networks will support a variety of service types. Many such systems are being designed with ATM or ATM like technology. A majority of Internet applicatio...
Rohit Goyal, Raj Jain, Mukul Goyal, Sonia Fahmy, B...
SIGSOFT
2003
ACM
16 years 5 months ago
Protecting C programs from attacks via invalid pointer dereferences
Writes via unchecked pointer dereferences rank high among vulnerabilities most often exploited by malicious code. The most common attacks use an unchecked string copy to cause a b...
Suan Hsi Yong, Susan Horwitz
ICWS
2009
IEEE
16 years 2 months ago
Reiki: Serviceability Architecture and Approach for Reduction and Management of Product Service Incidents
: © Reiki: Serviceability Architecture and Approach for Reduction and Management of Product Service Incidents Chris Connelly, Brian Cox, Tim Forell, Rui Liu, Dejan Milojicic, Alan...
Chris Connelly, Brian Cox, Tim Forell, Rui Liu, De...
EUROSYS
2008
ACM
16 years 2 months ago
Application-level isolation and recovery with solitude
When computer systems are compromised by an attack, it is difficult to determine the precise extent of the damage caused by the attack because the state changes made by an attack...
Shvetank Jain, Fareha Shafique, Vladan Djeric, Ash...
« Prev « First page 2414 / 2816 Last » Next »