Sciweavers

1402 search results - page 193 / 281
» Distributed Integrity Checking for Systems with Replicated D...
Sort
View
HPCA
1996
IEEE
15 years 8 months ago
Protected, User-Level DMA for the SHRIMP Network Interface
Traditional DMA requires the operating system to perform many tasks to initiate a transfer, with overhead on the order of hundreds or thousands of CPU instructions. This paper des...
Matthias A. Blumrich, Cezary Dubnicki, Edward W. F...
ICAS
2006
IEEE
140views Robotics» more  ICAS 2006»
15 years 10 months ago
Control System Framework for Autonomous Robots Based on Extended State Machines
We present a new framework optimized for the design, implementation, and testing of control systems for autonomous robots. It is based on a new visual specification language whic...
Torsten Merz, Piotr Rudol, Mariusz Wzorek
AINA
2010
IEEE
15 years 8 months ago
Empirical Analysis of Attackers Activity on Multi-tier Web Systems
—Web-based systems commonly face unique set of vulnerabilities and security threats due to their high exposure, access by browsers, and integration with databases. In this paper ...
Katerina Goseva-Popstojanova, Brandon Miller, Rist...
ATAL
2004
Springer
15 years 9 months ago
Naming Services in Multi-Agent Systems: A Design for Agent-Based White Pages
Distributed multi-agent systems require naming services to locate and communicate with remote agents. In this paper we focus on the design and implementation of the “White Pages...
Todd Wright
DIMVA
2009
15 years 5 months ago
Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks
Drive-by download attacks are among the most common methods for spreading malware today. These attacks typically exploit memory corruption vulnerabilities in web browsers and brows...
Manuel Egele, Peter Wurzinger, Christopher Kruegel...