Sciweavers

655 search results - page 117 / 131
» Source Coding for a Multihop Network
Sort
View
94
Voted
DSN
2002
IEEE
15 years 2 months ago
An Automated Approach to Increasing the Robustness of C Libraries
As our reliance on computers increases, so does the need for robust software. Previous studies have shown that many C libraries exhibit robustness problems due to exceptional inpu...
Christof Fetzer, Zhen Xiao
DSN
2009
IEEE
15 years 26 days ago
Precise request tracing and performance debugging for multi-tier services of black boxes
As more and more multi-tier services are developed from commercial components or heterogeneous middleware without the source code available, both developers and administrators nee...
Zhihong Zhang, Jianfeng Zhan, Yong Li, Lei Wang, D...
DSN
2008
IEEE
14 years 11 months ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu
SIAMDM
2010
101views more  SIAMDM 2010»
14 years 4 months ago
Rationality and Strongly Polynomial Solvability of Eisenberg--Gale Markets with Two Agents
Inspired by the convex program of Eisenberg and Gale which captures Fisher markets with linear utilities, Jain and Vazirani [STOC, 2007] introduced the class of EisenbergGale (EG)...
Deeparnab Chakrabarty, Nikhil R. Devanur, Vijay V....
TWC
2010
14 years 4 months ago
Interference-limited opportunistic relaying with reactive sensing
This work evaluates opportunistic relaying in the presence of thermal noise as well as interference, when channel sensing is conducted reactively, in slow fading environments. The ...
Aggelos Bletsas, Antonis G. Dimitriou, John N. Sah...