Sciweavers

1583 search results - page 57 / 317
» The Quorum Deployment Problem
Sort
View
119
Voted
NDSS
2000
IEEE
15 years 7 months ago
A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities
We describe a new technique for finding potential buffer overrun vulnerabilities in security-critical C code. The key to success is to use static analysis: we formulate detection...
David Wagner, Jeffrey S. Foster, Eric A. Brewer, A...
BIRTE
2006
133views Business» more  BIRTE 2006»
15 years 7 months ago
Leveraging Distributed Publish/Subscribe Systems for Scalable Stream Query Processing
Existing distributed publish/subscribe systems (DPSS) offer loosely coupled and easy to deploy content-based stream delivery services to a large number of users. However, the lack ...
Yongluan Zhou, Kian-Lee Tan, Feng Yu
AAAI
2007
15 years 5 months ago
Enabling Intelligent Content Discovery on the Mobile Internet
The mobile Internet is a massive opportunity for mobile operators and content providers, but despite significant improvements in handsets, infrastructure, content, and charging m...
Barry Smyth, Paul Cotter, Stephen Oman
ATAL
2008
Springer
15 years 5 months ago
Automatic Generation of Distributed Team Formation Algorithms from Organizational Models
Software systems are subject to ever increasing complexity and in need of efficient structuring. The concept of organization as an exand abstract real-world reference presents a pr...
Michael Köhler-Bußmeier, Matthias Weste...
IM
2007
15 years 4 months ago
Interactive Informatics on Internet Infrastructure
— We present the design and evaluation of I4, a network infrastructure that enables information exchange and collaboration among different domains. I4 can help address problems, ...
F. Zhao, V. R. Vemuri, Shyhtsun Felix Wu, F. Xue, ...