Sciweavers

2015 search results - page 209 / 403
» Hidden Software Capabilities
Sort
View
125
Voted
ACSAC
2005
IEEE
15 years 9 months ago
A Framework for Detecting Network-based Code Injection Attacks Targeting Windows and UNIX
Code injection vulnerabilities continue to prevail. Attacks of this kind such as stack buffer overflows and heap buffer overflows account for roughly half of the vulnerabilities...
Stig Andersson, Andrew Clark, George M. Mohay, Bra...
142
Voted
RTAS
2005
IEEE
15 years 9 months ago
A Platform-Independent Component Modeling Language for Distributed Real-Time and Embedded Systems
This paper provides two contributions to the study of developing and applying domain-specific modeling languages (DSMLS) to distributed real-time and embedded (DRE) systems – p...
Krishnakumar Balasubramanian, Jaiganesh Balasubram...
ARCS
2005
Springer
15 years 9 months ago
Towards Autonomic Networking Using Overlay Routing Techniques
With an ever-growing number of computers being embedded into our surroundings, the era of ubiquitous computing is approaching fast. However, as the number of networked devices incr...
Kendy Kutzner, Curt Cramer, Thomas Fuhrmann
ERCIMDL
2005
Springer
113views Education» more  ERCIMDL 2005»
15 years 9 months ago
mod_oai: An Apache Module for Metadata Harvesting
We describe mod_oai, an Apache 2.0 module that implements the Open Archives Initiative Protocol for Metadata Harvesting (OAI-PMH). The OAI-PMH is the de facto standard for metadata...
Michael L. Nelson, Herbert Van de Sompel, Xiaoming...
162
Voted
EUC
2005
Springer
15 years 9 months ago
Dynamic Resource Discovery for Sensor Networks
As sensor networks mature the current generation of sensor networks that are application-specific and exposed only to a limited set of users will give way to heterogeneous sensor ...
Sameer Tilak, Kenneth Chiu, Nael B. Abu-Ghazaleh, ...