Sciweavers

717 search results - page 137 / 144
» Efficient operating system support for group unicast
Sort
View
ICCD
2000
IEEE
119views Hardware» more  ICCD 2000»
15 years 4 months ago
Source-Level Transformations for Improved Formal Verification
A major obstacle to widespread acceptance of formal verification is the difficulty in using the tools effectively. Although learning the basic syntax and operation of a formal ver...
Brian D. Winters, Alan J. Hu
RAID
1999
Springer
15 years 5 months ago
Audit logs: to keep or not to keep?
We approached this line of inquiry by questioning the conventional wisdom that audit logs are too large to be analyzed and must be reduced and filtered before the data can be anal...
Christopher Wee
CHI
2004
ACM
16 years 1 months ago
WinCuts: manipulating arbitrary window regions for more effective use of screen space
Each window on our computer desktop provides a view into some information. Although users can currently manipulate multiple windows, we assert that being able to spatially arrange...
Desney S. Tan, Brian Meyers, Mary Czerwinski
CN
2008
117views more  CN 2008»
15 years 1 months ago
Broker-placement in latency-aware peer-to-peer networks
In large peer-to-peer (P2P) overlay networks, nodes usually share resources to support all kinds of applications. In such networks, a subset of the nodes may assume the role of br...
Pawel Garbacki, Dick H. J. Epema, Maarten van Stee...
VEE
2006
ACM
142views Virtualization» more  VEE 2006»
15 years 7 months ago
Secure and practical defense against code-injection attacks using software dynamic translation
One of the most common forms of security attacks involves exploiting a vulnerability to inject malicious code into an executing application and then cause the injected code to be ...
Wei Hu, Jason Hiser, Daniel Williams, Adrian Filip...