Sciweavers

14824 search results - page 2631 / 2965
» Security - Introduction
Sort
View
PASTE
2010
ACM
15 years 8 months ago
Extracting compiler provenance from program binaries
We present a novel technique that identifies the source compiler of program binaries, an important element of program provenance. Program provenance answers fundamental questions...
Nathan E. Rosenblum, Barton P. Miller, Xiaojin Zhu
PLDI
2010
ACM
15 years 8 months ago
An analysis of the dynamic behavior of JavaScript programs
The JavaScript programming language is widely used for web programming and, increasingly, for general purpose computing. As such, improving the correctness, security and performan...
Gregor Richards, Sylvain Lebresne, Brian Burg, Jan...
137
Voted
CCGRID
2002
IEEE
15 years 8 months ago
NEVRLATE: Scalable Resource Discovery
A scalable and expressive peer-to-peer (P2P) networking and computing framework requires efficient resource discovery services. Here we propose NEVRLATE, for Network-Efficient V...
Ajay Chander, Steven Dawson, Patrick Lincoln, Davi...
DANCE
2002
IEEE
15 years 8 months ago
Active Names: Flexible Location and Transport of Wide-Area Resources
In this paper, we explore flexible name resolution as a way of supporting extensibility for wide-area distributed services. Our approach, called Active Names, maps names to a cha...
Amin Vahdat, Michael Dahlin, Thomas E. Anderson, A...
DANCE
2002
IEEE
15 years 8 months ago
Active Network Vision and Reality: Lessons from a Capsule-Based System
Although active networks have generated much debate in the research community, on the whole there has been little hard evidence to inform this debate. This paper aims to redress t...
David Wetherall
« Prev « First page 2631 / 2965 Last » Next »