Sciweavers

1541 search results - page 161 / 309
» Tools and Techniques for Model Checking Networked Programs
Sort
View
OOPSLA
2004
Springer
15 years 10 months ago
Transparent proxies for java futures
A proxy object is a surrogate or placeholder that controls access to another target object. Proxies can be used to support distributed programming, lazy or parallel evaluation, ac...
Polyvios Pratikakis, Jaime Spacco, Michael W. Hick...
WWW
2002
ACM
16 years 5 months ago
Multimedia meets computer graphics in SMIL2.0: a time model for the web
Multimedia scheduling models provide a rich variety of tools for managing the synchronization of media like video and audio, but generally have an inflexible model for time itself...
Patrick Schmitz
DIMVA
2011
14 years 8 months ago
Escape from Monkey Island: Evading High-Interaction Honeyclients
Abstract. High-interaction honeyclients are the tools of choice to detect malicious web pages that launch drive-by-download attacks. Unfortunately, the approach used by these tools...
Alexandros Kapravelos, Marco Cova, Christopher Kru...
153
Voted
TOMACS
2002
110views more  TOMACS 2002»
15 years 4 months ago
Rapid model parameterization from traffic measurements
The utility of simulations and analysis heavily relies on good models of network traffic. While network traffic constantly changing over time, existing approaches typically take y...
Kun-Chan Lan, John S. Heidemann
ETFA
2006
IEEE
15 years 8 months ago
Verification of The Minimum Cost Forwarding Protocol for Wireless Sensor Networks
Wireless sensor networks (WSN) consist of small self-contained devices with computational, sensing and wireless communication capabilities. They allow flexible, powerful, tetherles...
William D. Henderson, Steven Tron