Sciweavers

10909 search results - page 2161 / 2182
» Evaluating Backup Algorithms
Sort
View
WCRE
2010
IEEE
14 years 7 months ago
Visually Supporting Source Code Changes Integration: The Torch Dashboard
—Automatic and advanced merging algorithms help programmers to merge their modifications in main development repositories. However, there is little support to help release maste...
Veroonica Uquillas Gomez, Stéphane Ducasse,...
WINET
2010
144views more  WINET 2010»
14 years 7 months ago
Cross-layer quality-driven adaptation for scheduling heterogeneous multimedia over 3G satellite networks
Wireless networks are experiencing a paradigm shift from focusing on the traditional data transfer to accommodating the rapidly increasing multimedia traffic. Hence, their schedul...
Hongfei Du, Xiaozheng Huang, Jie Liang, Jiangchuan...
96
Voted
CCS
2010
ACM
14 years 7 months ago
The limits of automatic OS fingerprint generation
Remote operating system fingerprinting relies on implementation differences between OSs to identify the specific variant executing on a remote host. Because these differences can ...
David W. Richardson, Steven D. Gribble, Tadayoshi ...
CIKM
2010
Springer
14 years 7 months ago
Manifold ranking with sink points for update summarization
Update summarization aims to create a summary over a topic-related multi-document dataset based on the assumption that the user has already read a set of earlier documents of the ...
Pan Du, Jiafeng Guo, Jin Zhang, Xueqi Cheng
FDTC
2010
Springer
132views Cryptology» more  FDTC 2010»
14 years 7 months ago
Fault Injection Resilience
Fault injections constitute a major threat to the security of embedded systems. The errors in the cryptographic algorithms have been shown to be extremely dangerous, since powerful...
Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger,...
« Prev « First page 2161 / 2182 Last » Next »