Sciweavers

5600 search results - page 950 / 1120
» Synthesizing robust systems
Sort
View
91
Voted
ISCAS
2006
IEEE
88views Hardware» more  ISCAS 2006»
15 years 6 months ago
SiP integration of intelligent, adaptive, self-sustaining power management solutions for portable applications
Abstract—Power management is an essential component of any electrical system, and nowadays a limiting factor in the miniaturization of portable electronic devices. Not only are t...
E. O. Torres, Min Chen, H. Pooya Forghani-zadeh, V...
111
Voted
ISCC
2006
IEEE
129views Communications» more  ISCC 2006»
15 years 6 months ago
A Semantic Overlay Network for P2P Schema-Based Data Integration
Abstract— Today data sources are pervasive and their number is growing tremendously. Current tools are not prepared to exploit this unprecedented amount of information and to cop...
Carmela Comito, Simon Patarin, Domenico Talia
90
Voted
NDSS
2006
IEEE
15 years 6 months ago
Induced Churn as Shelter from Routing-Table Poisoning
Structured overlays are an important and powerful class of overlay networks that has emerged in recent years. They are typically targeted at peer-to-peer deployments involving mil...
Tyson Condie, Varun Kacholia, Sriram Sank, Joseph ...
IMC
2006
ACM
15 years 6 months ago
binpac: a yacc for writing application protocol parsers
A key step in the semantic analysis of network traffic is to parse the traffic stream according to the high-level protocols it contains. This process transforms raw bytes into s...
Ruoming Pang, Vern Paxson, Robin Sommer, Larry L. ...
78
Voted
IMC
2006
ACM
15 years 6 months ago
Finding diversity in remote code injection exploits
Remote code injection exploits inflict a significant societal cost, and an active underground economy has grown up around these continually evolving attacks. We present a method...
Justin Ma, John Dunagan, Helen J. Wang, Stefan Sav...