Sciweavers

6300 search results - page 1219 / 1260
» We have it easy, but do we have it right
Sort
View
91
Voted
USS
2004
15 years 2 months ago
TIED, LibsafePlus: Tools for Runtime Buffer Overflow Protection
Buffer overflow exploits make use of the treatment of strings in C as character arrays rather than as first-class objects. Manipulation of arrays as pointers and primitive pointer...
Kumar Avijit, Prateek Gupta, Deepak Gupta
122
Voted
PDPTA
2003
15 years 2 months ago
Tuxedo: A Peer-to-Peer Caching System
We are witnessing two trends in Web content access: (a) increasing amounts of dynamic and personalized Web content, and (b) a significant growth in “on-the-move” access using...
Weisong Shi, Kandarp Shah, Yonggen Mao, Vipin Chau...
MM
2010
ACM
148views Multimedia» more  MM 2010»
15 years 27 days ago
RAPID: a reliable protocol for improving delay
Recently, there has been a dramatic increase in interactive cloud based software applications (e.g. working on remote machines, online games, interactive websites such as financia...
Sanjeev Mehrotra, Jin Li, Cheng Huang
GLOBE
2010
Springer
15 years 26 days ago
High Throughput Data-Compression for Cloud Storage
Abstract. As data volumes processed by large-scale distributed dataintensive applications grow at high-speed, an increasing I/O pressure is put on the underlying storage service, w...
Bogdan Nicolae
118
Voted
AAMAS
2008
Springer
15 years 25 days ago
Using quantitative models to search for appropriate organizational designs
As the scale and scope of distributed and multi-agent systems grow, it becomes increasingly important to design and manage the participants' interactions. The potential for b...
Bryan Horling, Victor R. Lesser
« Prev « First page 1219 / 1260 Last » Next »