Sciweavers

3134 search results - page 532 / 627
» Embedded System Design for Network Time Synchronization
Sort
View
CCS
2005
ACM
15 years 9 months ago
Automatic diagnosis and response to memory corruption vulnerabilities
Cyber attacks against networked computers have become relentless in recent years. The most common attack method is to exploit memory corruption vulnerabilities such as buffer ove...
Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Chris...
GLVLSI
2005
IEEE
124views VLSI» more  GLVLSI 2005»
15 years 9 months ago
A first look at the interplay of code reordering and configurable caches
The instruction cache is a popular target for optimizations of microprocessor-based systems because of the cache’s high impact on system performance and power, and because of th...
Ann Gordon-Ross, Frank Vahid, Nikil Dutt
130
Voted
MM
2010
ACM
167views Multimedia» more  MM 2010»
15 years 3 months ago
Improving online gaming quality using detour paths
We study the problem of improving the user perceived quality of online games in which multiple players form a game session and exchange game-state updates over an overlay network....
Cong Ly, Cheng-Hsin Hsu, Mohamed Hefeeda
ICDE
2007
IEEE
94views Database» more  ICDE 2007»
16 years 4 months ago
RoXSum: Leveraging Data Aggregation and Batch Processing for XML Routing
Content-based routing is the primary form of communication within publish/subscribe systems. In those systems data transmission is performed by sophisticated overlay networks of c...
Zografoula Vagena, Mirella Moura Moro, Vassilis J....
DBISP2P
2003
Springer
152views Database» more  DBISP2P 2003»
15 years 8 months ago
An Adaptive and Scalable Middleware for Distributed Indexing of Data Streams
Abstract. We are witnessing a dramatic increase in the use of datacentric distributed systems such as global grid infrastructures, sensor networks, network monitoring, and various ...
Ahmet Bulut, Roman Vitenberg, Fatih Emekçi,...