Sciweavers

353 search results - page 54 / 71
» Design of a scalable network programming framework
Sort
View
EDO
2006
Springer
15 years 8 months ago
Damon: a decentralized aspect middleware built on top of a peer-to-peer overlay network
In this paper we present Damon, a decentralized wide-area runtime aspect middleware built on top of a structured peer-topeer (p2p) substrate and a dynamic Aspect Oriented Programm...
Rubén Mondéjar, Pedro García ...
106
Voted
DSN
2005
IEEE
15 years 10 months ago
Detecting Stealth Software with Strider GhostBuster
Stealth malware programs that silently infect enterprise and consumer machines are becoming a major threat to the future of the Internet [XZ04]. Resource hiding is a powerful stea...
Yi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, C...
NDSS
2008
IEEE
15 years 11 months ago
Automated Whitebox Fuzz Testing
Fuzz testing is an effective technique for finding security vulnerabilities in software. Traditionally, fuzz testing tools apply random mutations to well-formed inputs of a progr...
Patrice Godefroid, Michael Y. Levin, David A. Moln...
IFIP
2007
Springer
15 years 11 months ago
Decentralized Supplementary Services for Voice-over-IP Telephony
As current Voice-over-IP (VoIP) systems encourage a direct communication between the callees they are similar in design to peerto-peer (P2P) approaches. Therefore, we introduce a f...
Christoph Spleiß, Gerald Kunzmann
VR
2002
IEEE
117views Virtual Reality» more  VR 2002»
15 years 9 months ago
DLoVe: Using Constraints to Allow Parallel Processing in Multi-User Virtual Reality
In this paper, we introduce DLoVe, a new paradigm for designing and implementing distributed and nondistributed virtual reality applications, using one-way constraints. DLoVe allo...
Leonidas Deligiannidis, Robert J. K. Jacob