Sciweavers

8080 search results - page 1370 / 1616
» From Computer Networks to Agent Networks
Sort
View
124
Voted
DSN
2004
IEEE
15 years 8 months ago
Automated Synthesis of Multitolerance
We concentrate on automated synthesis of multitolerant programs, i.e., programs that tolerate multiple classes of faults and provide a (possibly) different level of fault-toleranc...
Sandeep S. Kulkarni, Ali Ebnenasir
RAID
2010
Springer
15 years 3 months ago
Detecting the Onset of Infection for Secure Hosts
Abstract. Software flaws in applications such as a browser may be exploited by attackers to launch drive-by-download (DBD), which has become the major vector of malware infection....
Kui Xu, Qiang Ma, Danfeng (Daphne) Yao
AINA
2009
IEEE
15 years 11 months ago
SOA Initiatives for eLearning: A Moodle Case
— Mobile learning applications introduce a new degree of ubiquitousness in the learning process. There is a new generation of ICT-powered mobile learning experiences that exist i...
María José Casany Guerrero, Marc Ali...
NDSS
2009
IEEE
15 years 11 months ago
Document Structure Integrity: A Robust Basis for Cross-site Scripting Defense
Cross-site scripting (or XSS) has been the most dominant class of web vulnerabilities in 2007. The main underlying reason for XSS vulnerabilities is that web markup and client-sid...
Yacin Nadji, Prateek Saxena, Dawn Song
ISAAC
2009
Springer
142views Algorithms» more  ISAAC 2009»
15 years 11 months ago
Of Choices, Failures and Asynchrony: The Many Faces of Set Agreement
Abstract. Set agreement is a fundamental problem in distributed computing in which processes collectively choose a small subset of values from a larger set of proposals. The imposs...
Dan Alistarh, Seth Gilbert, Rachid Guerraoui, Core...
« Prev « First page 1370 / 1616 Last » Next »