Sciweavers

4118 search results - page 750 / 824
» Mechanisms for usage control
Sort
View
MOBIHOC
2008
ACM
15 years 11 months ago
Complexity in wireless scheduling: impact and tradeoffs
It has been an important research topic since 1992 to maximize stability region in constrained queueing systems, which includes the study of scheduling over wireless ad hoc networ...
Yung Yi, Alexandre Proutiere, Mung Chiang
75
Voted
ICWS
2009
IEEE
15 years 9 months ago
Mobile In-store Personalized Services
: © Mobile In-Store Personalized Services Jun Li, Ismail Ari, Jhilmil Jain, Alan H. Karp, Mohamed; Dekhil HP Laboratories HPL-2009-48 mobile shopping assistant, cross-organization...
Jun Li, Ismail Ari, Jhilmil Jain, Alan H. Karp, Mo...
EUROSYS
2008
ACM
15 years 9 months ago
Application-level isolation and recovery with solitude
When computer systems are compromised by an attack, it is difficult to determine the precise extent of the damage caused by the attack because the state changes made by an attack...
Shvetank Jain, Fareha Shafique, Vladan Djeric, Ash...
PEPM
2010
ACM
15 years 8 months ago
Context-sensitive analysis of obfuscated x86 executables
A method for context-sensitive analysis of binaries that may have obfuscated procedure call and return operations is presented. Such binaries may use operators to directly manipul...
Arun Lakhotia, Davidson R. Boccardo, Anshuman Sing...
VEE
2010
ACM
291views Virtualization» more  VEE 2010»
15 years 6 months ago
Neon: system support for derived data management
Modern organizations face increasingly complex information management requirements. A combination of commercial needs, legal liability and regulatory imperatives has created a pat...
Qing Zhang, John McCullough, Justin Ma, Nabil Sche...