Sciweavers

20813 search results - page 4015 / 4163
» Introduction to Computer Networking
Sort
View
LCTRTS
2010
Springer
15 years 12 months ago
Modeling structured event streams in system level performance analysis
This paper extends the methodology of analytic real-time analysis of distributed embedded systems towards merging and extracting sub-streams based on event type information. For e...
Simon Perathoner, Tobias Rein, Lothar Thiele, Kai ...
OZCHI
2009
ACM
15 years 12 months ago
Towards an ethical interaction design: the issue of including stakeholders in law-enforcement software development
In the public sector (particularly in the UK in light of recent reforms i.e. the Local Government Act 2000, etc.) a greater degree of accountability and public involvement or inte...
Patrick G. Watson, Penny Duquenoy, Margaret Brenna...
SAC
2009
ACM
15 years 11 months ago
Remote software protection by orthogonal client replacement
In a typical client-server scenario, a trusted server provides valuable services to a client, which runs remotely on an untrusted platform. Of the many security vulnerabilities th...
Mariano Ceccato, Paolo Tonella, Mila Dalla Preda, ...
BIRTHDAY
2009
Springer
15 years 11 months ago
Vertical Object Layout and Compression for Fixed Heaps
Research into embedded sensor networks has placed increased focus on the problem of developing reliable and flexible software for microcontroller-class devices. Languages such as ...
Ben Titzer, Jens Palsberg
CSE
2009
IEEE
15 years 11 months ago
Analysing BitTorrent's Seeding Strategies
Abstract— BitTorrent is a typical peer-to-peer (P2P) file distribution application that has gained tremendous popularity in recent years. A considerable amount of research exists...
Xinuo Chen, Stephen A. Jarvis
« Prev « First page 4015 / 4163 Last » Next »