Sciweavers

11217 search results - page 2054 / 2244
» Network Coding for Wireless Networks
Sort
View
DSN
2000
IEEE
15 years 2 months ago
On the Emulation of Software Faults by Software Fault Injection
This paper presents an experimental study on the emulation of software faults by fault injection. In a first experiment, a set of real software faults has been compared with fault...
Henrique Madeira, Diamantino Costa, Marco Vieira
DSN
2009
IEEE
15 years 2 months ago
Precise request tracing and performance debugging for multi-tier services of black boxes
As more and more multi-tier services are developed from commercial components or heterogeneous middleware without the source code available, both developers and administrators nee...
Zhihong Zhang, Jianfeng Zhan, Yong Li, Lei Wang, D...
ASAP
2007
IEEE
134views Hardware» more  ASAP 2007»
15 years 25 days ago
Methodology and Toolset for ASIP Design and Development Targeting Cryptography-Based Applications
Network processors utilizing general-purpose instruction-set architectures (ISA) limit network throughput due to latency incurred from cryptography and hashing applications (AES, ...
David Montgomery, Ali Akoglu
DSN
2008
IEEE
15 years 24 days ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu
FASE
2008
Springer
15 years 24 days ago
Language-Based Optimisation of Sensor-Driven Distributed Computing Applications
In many distributed computing paradigms, especially sensor networks and ubiquitous computing but also grid computing and web services, programmers commonly tie their application to...
Jonathan J. Davies, Alastair R. Beresford, Alan My...
« Prev « First page 2054 / 2244 Last » Next »