Sciweavers

3792 search results - page 657 / 759
» Techniques for Trusted Software Engineering
Sort
View
143
Voted
ACSAC
2010
IEEE
14 years 10 months ago
G-Free: defeating return-oriented programming through gadget-less binaries
Despite the numerous prevention and protection mechanisms that have been introduced into modern operating systems, the exploitation of memory corruption vulnerabilities still repr...
Kaan Onarlioglu, Leyla Bilge, Andrea Lanzi, Davide...
123
Voted
MOBIHOC
2010
ACM
14 years 10 months ago
Longest-queue-first scheduling under SINR interference model
We investigate the performance of longest-queue-first (LQF) scheduling (i.e., greedy maximal scheduling) for wireless networks under the SINR interference model. This interference...
Long Bao Le, Eytan Modiano, Changhee Joo, Ness B. ...
DLS
2009
150views Languages» more  DLS 2009»
14 years 10 months ago
Fast type reconstruction for dynamically typed programming languages
Type inference and type reconstruction derive static types for program elements that have no static type associated with them. They have a wide range of usage, such as helping to ...
Frédéric Pluquet, Antoine Marot, Roe...
141
Voted
CSCW
2011
ACM
14 years 7 months ago
It's about time: confronting latency in the development of groupware systems
The presence of network latency leads to usability problems in distributed groupware applications. Example problems include difficulty synchronizing tightly-coupled collaboration...
Cheryl Savery, T. C. Nicholas Graham
119
Voted
PE
2010
Springer
123views Optimization» more  PE 2010»
14 years 7 months ago
Evaluating fluid semantics for passive stochastic process algebra cooperation
Fluid modelling is a next-generation technique for analysing massive performance models. Passive cooperation is a popular cooperation mechanism frequently used by performance engi...
Richard A. Hayden, Jeremy T. Bradley