Sciweavers

4820 search results - page 300 / 964
» Implementing Signatures for C
Sort
View
124
Voted
KAIS
2002
120views more  KAIS 2002»
15 years 3 months ago
Agents in E-Commerce: State of the Art
Abstract. This paper surveys the state of the art of agent-mediated electronic commerce (ecommerce), especially in business-to-consumer (B2C) e-commerce and business-to-business (B...
Minghua He, Ho-fung Leung
141
Voted
ISSRE
2010
IEEE
15 years 1 months ago
Preventing Overflow Attacks by Memory Randomization
Buffer overflow is known to be a common memory vulnerability affecting software. It is exploited to gain various kinds of privilege escalation. C and C++ are very commonly used to ...
Vivek Iyer, Amit Kanitkar, Partha Dasgupta, Raghun...
156
Voted
CSCWD
2009
Springer
15 years 1 months ago
The analysis and development of Taiwan's industrial logistics hubs
With the trend of globalization, enterprises require to extend their logistics scope from domestic to international, integrate logistics networks, and improve the agility and effi...
Charles V. Trappey, Amy J. C. Trappey, Gilbert Y. ...
ICDCS
1997
IEEE
15 years 8 months ago
Evaluating CORBA Latency and Scalability Over High-Speed ATM Networks
Conventional implementations of CORBA communication middleware incur significant overhead when used for performance-sensitive applications over high-speed networks. As gigabit ne...
Douglas C. Schmidt, Aniruddha S. Gokhale
168
Voted
IMC
2006
ACM
15 years 10 months ago
Malware prevalence in the KaZaA file-sharing network
In recent years, more than 200 viruses have been reported to use a peer-to-peer (P2P) file-sharing network as a propagation vector. Disguised as files that are frequently exchan...
Seungwon Shin, Jaeyeon Jung, Hari Balakrishnan