Sciweavers

1257 search results - page 182 / 252
» Open Source Requirements Engineering
Sort
View
IMC
2005
ACM
15 years 8 months ago
Exploiting Internet Route Sharing for Large Scale Available Bandwidth Estimation
Recent progress in active measurement techniques has made it possible to estimate end-to-end path available bandwidth. However, how to efficiently obtain available bandwidth info...
Ningning Hu, Peter Steenkiste
HIPEAC
2005
Springer
15 years 8 months ago
Memory-Centric Security Architecture
Abstract. This paper presents a new security architecture for protecting software confidentiality and integrity. Different from the previous process-centric systems designed for ...
Weidong Shi, Chenghuai Lu, Hsien-Hsin S. Lee
CEAS
2004
Springer
15 years 8 months ago
Resisting SPAM Delivery by TCP Damping
Spam has become a major problem that is threatening the efficiency of the current email system. Spam is overwhelming the Internet because 1) emails are pushed from senders to recei...
Kang Li, Calton Pu, Mustaque Ahamad
JTRES
2009
ACM
15 years 7 months ago
A technology compatibility kit for safety critical Java
Safety Critical Java is a specification being built on top a subset of interfaces from the Real-Time Specification for Java. It is designed to ease development and analysis of s...
Lei Zhao, Daniel Tang, Jan Vitek
ECOOP
2007
Springer
15 years 7 months ago
Non-null References by Default in Java: Alleviating the Nullity Annotation Burden
With the advent of Java 5 annotations, we note a marked increase in the availability of tools that can statically detect potential null dereferences. For such tools to be truly eff...
Patrice Chalin, Perry R. James