Sciweavers

10435 search results - page 1934 / 2087
» Measuring system normality
Sort
View
CCS
2009
ACM
15 years 7 months ago
Secure open source collaboration: an empirical study of linus' law
Open source software is often considered to be secure. One factor in this confidence in the security of open source software lies in leveraging large developer communities to find...
Andrew Meneely, Laurie A. Williams
103
Voted
DATE
2009
IEEE
189views Hardware» more  DATE 2009»
15 years 7 months ago
CUFFS: An instruction count based architectural framework for security of MPSoCs
—Multiprocessor System on Chip (MPSoC) architecture is rapidly gaining momentum for modern embedded devices. The vulnerabilities in software on MPSoCs are often exploited to caus...
Krutartha Patel, Sri Parameswaran, Roshan G. Ragel
ICNP
2009
IEEE
15 years 7 months ago
CUBS: Coordinated Upload Bandwidth Sharing in Residential Networks
— Millions of residential users are widely served by cable or DSL connections with modest upload bandwidth and relatively high download bandwidth. For the increasingly important ...
Enhua Tan, Lei Guo, Songqing Chen, Xiaodong Zhang
ICPP
2009
IEEE
15 years 7 months ago
On Maximum Stability with Enhanced Scalability in High-Churn DHT Deployment
Abstract—When applied in a commercial deployment, DHTbased P2P protocols face a dilemma: although most real-world participants are so unstable that the maintenance overhead is pr...
Junfeng Xie, Zhenhua Li, Guihai Chen, Jie Wu
87
Voted
ICRA
2009
IEEE
106views Robotics» more  ICRA 2009»
15 years 7 months ago
Simultaneous local and global state estimation for robotic navigation
— Recent applications of robotics often demand two types of spatial awareness: 1) A fine-grained description of the robot’s immediate surroundings for obstacle avoidance and p...
David C. Moore, Albert S. Huang, Matthew Walter, E...
« Prev « First page 1934 / 2087 Last » Next »