Sciweavers

3898 search results - page 520 / 780
» Maintaining Component-Based Systems
Sort
View
DIMVA
2009
15 years 5 months ago
Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks
Drive-by download attacks are among the most common methods for spreading malware today. These attacks typically exploit memory corruption vulnerabilities in web browsers and brows...
Manuel Egele, Peter Wurzinger, Christopher Kruegel...
139
Voted
HPDC
2010
IEEE
15 years 5 months ago
Efficient querying of distributed provenance stores
Current projects that automate the collection of provenance information use a centralized architecture for managing the resulting metadata - that is, provenance is gathered at rem...
Ashish Gehani, Minyoung Kim, Tanu Malik
126
Voted
MM
2010
ACM
186views Multimedia» more  MM 2010»
15 years 4 months ago
Hybrid load balancing for online games
As massively multiplayer online games are becoming very popular, how to support a large number of concurrent users while maintaining the game performance has become an important r...
Rynson W. H. Lau
DASFAA
2007
IEEE
162views Database» more  DASFAA 2007»
15 years 4 months ago
Framework for Extending RFID Events with Business Rule
Radio frequency identification (RFID) technology is believed to be the next revolutionary step in supply-chain management. Complex process simplification using RFID technology can ...
Mikyeong Moon, Seongjin Kim, Keunhyuk Yeom, Heeseo...
116
Voted
BIOSYSTEMS
2007
95views more  BIOSYSTEMS 2007»
15 years 4 months ago
Physical limits of computation and emergence of life
The computational process is based on the activity linking mathematical equations to a materialized physical world. It consumes energy which lower limit is defined by the set of ...
Abir U. Igamberdiev