Sciweavers

4722 search results - page 677 / 945
» Encoding Program Executions
Sort
View
WEA
2010
Springer
300views Algorithms» more  WEA 2010»
15 years 10 months ago
Using Bound Sets in Multiobjective Optimization: Application to the Biobjective Binary Knapsack Problem
This paper is devoted to a study of the impact of using bound sets in biobjective optimization. This notion, introduced by Villareal and Karwan [19], has been independently revisit...
Charles Delort, Olivier Spanjaard
ACSAC
2009
IEEE
15 years 10 months ago
Surgically Returning to Randomized lib(c)
—To strengthen systems against code injection attacks, the write or execute only policy (W⊕X) and address space layout randomization (ASLR) are typically used in combination. T...
Giampaolo Fresi Roglia, Lorenzo Martignoni, Robert...
128
Voted
DASFAA
2009
IEEE
152views Database» more  DASFAA 2009»
15 years 10 months ago
Predicting Timing Failures in Web Services
Abstract. Web services are increasingly being used in business critical environments, enabling uniform access to services provided by distinct parties. In these environments, an op...
Nuno Laranjeiro, Marco Vieira, Henrique Madeira
90
Voted
DAC
2009
ACM
15 years 10 months ago
Endosymbiotic computing: enabling surrogate GUI and cyber-physical connectivity
Endosymbiotic Computing entails attaching an RF-enabled microcontroller module (endomodule) to an appliance such that it appears as a networked device in the cyber world. It enabl...
Pai H. Chou
PPPJ
2009
ACM
15 years 10 months ago
Actor frameworks for the JVM platform: a comparative analysis
The problem of programming scalable multicore processors has renewed interest in message-passing languages and frameworks. Such languages and frameworks are typically actororiente...
Rajesh K. Karmani, Amin Shali, Gul Agha