Sciweavers

10910 search results - page 2104 / 2182
» Input modeling using a computer algebra system
Sort
View
CSFW
2011
IEEE
13 years 9 months ago
Local Memory via Layout Randomization
—Randomization is used in computer security as a tool to introduce unpredictability into the software infrastructure. In this paper, we study the use of randomization to achieve ...
Radha Jagadeesan, Corin Pitcher, Julian Rathke, Ja...

Publication
219views
16 years 8 months ago
Achieving QoS for TCP Traffic in Satellite Networks with Differentiated Services
Satellite networks play an indispensable role in providing global Internet access and electronic connectivity. To achieve such a global communications, provisioning of quality of s...
Arjan Durresi, Sastri Kota, Mukul Goyal, Raj Jain,...
ICDE
2002
IEEE
149views Database» more  ICDE 2002»
15 years 11 months ago
Indexing Spatio-Temporal Data Warehouses
Spatio-temporal databases store information about the positions of individual objects over time. In many applications however, such as traffic supervision or mobile communication ...
Dimitris Papadias, Yufei Tao, Panos Kalnis, Jun Zh...
KDD
2003
ACM
162views Data Mining» more  KDD 2003»
15 years 10 months ago
Improving spatial locality of programs via data mining
In most computer systems, page fault rate is currently minimized by generic page replacement algorithms which try to model the temporal locality inherent in programs. In this pape...
Karlton Sequeira, Mohammed Javeed Zaki, Boleslaw K...
PODS
2005
ACM
119views Database» more  PODS 2005»
15 years 10 months ago
Security analysis of cryptographically controlled access to XML documents
Some promising recent schemes for XML access control employ encryption for implementing security policies on published data, avoiding data duplication. In this paper we study one ...
Bogdan Warinschi, Martín Abadi
« Prev « First page 2104 / 2182 Last » Next »