Sciweavers

1541 search results - page 238 / 309
» Tools and Techniques for Model Checking Networked Programs
Sort
View
122
Voted
CCS
2010
ACM
14 years 10 months ago
The limits of automatic OS fingerprint generation
Remote operating system fingerprinting relies on implementation differences between OSs to identify the specific variant executing on a remote host. Because these differences can ...
David W. Richardson, Steven D. Gribble, Tadayoshi ...
MDM
2009
Springer
269views Communications» more  MDM 2009»
15 years 7 months ago
R-U-In? - Exploiting Rich Presence and Converged Communications for Next-Generation Activity-Oriented Social Networking
—With the growing popularity of social networking, traditional Internet Service Providers (ISPs) and Telecom operators have both started exploring new opportunities to boost thei...
Nilanjan Banerjee, Dipanjan Chakraborty, Koustuv D...
ATAL
2008
Springer
15 years 2 months ago
An approach to online optimization of heuristic coordination algorithms
Due to computational intractability, large scale coordination algorithms are necessarily heuristic and hence require tuning for particular environments. In domains where character...
Jumpol Polvichai, Paul Scerri, Michael Lewis
98
Voted
DSRT
2008
IEEE
15 years 7 months ago
Design of Application-Specific Incentives in P2P Networks
A rational P2P node may decide not to provide a particular resource or to provide it with degraded quality. If nodes are very likely to behave this way, or if the failure of an P2...
Andrew Roczniak, Abdulmotaleb El-Saddik, Ross Kouh...
SIGCSE
2003
ACM
198views Education» more  SIGCSE 2003»
15 years 5 months ago
Computer graphics in undergraduate computational science education
Computer graphics forms an important part of a working scientist’s tools. This may be provided by resources with the scientist’s group or by capabilities of the toolkits that ...
Steve Cunningham, Angela B. Shiflet