Sciweavers

5962 search results - page 940 / 1193
» Working with Patterns and Code
Sort
View
IPPS
2008
IEEE
15 years 11 months ago
On utilization of contributory storage in desktop grids
Modern desktop grid environments and shared computing platforms have popularized the use of contributory resources, such as desktop computers, as computing substrates for a variet...
Chreston Miller, Ali Raza Butt, Patrick Butler
KBSE
2008
IEEE
15 years 11 months ago
Automated Aspect Recommendation through Clustering-Based Fan-in Analysis
Identifying code implementing a crosscutting concern (CCC) automatically can benefit the maintainability and evolvability of the application. Although many approaches have been p...
Danfeng Zhang, Yao Guo, Xiangqun Chen
140
Voted
NOMS
2008
IEEE
120views Communications» more  NOMS 2008»
15 years 11 months ago
SGNET: Implementation insights
—We present in this paper SGNET, a distributed framework to collect information on Internet attacks, with special attention to self-propagating malware and code injections. This ...
Corrado Leita, Marc Dacier
SCAM
2008
IEEE
15 years 11 months ago
Automatic Determination of May/Must Set Usage in Data-Flow Analysis
Data-flow analysis is a common technique to gather program information for use in transformations such as register allocation, dead-code elimination, common subexpression elimina...
Andrew Stone, Michelle Strout, Shweta Behere
SP
2008
IEEE
132views Security Privacy» more  SP 2008»
15 years 11 months ago
Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping
We consider the following problem: how can two devices that do not share any secrets establish a shared secret key over a wireless radio channel in the presence of a communication...
Mario Strasser, Christina Pöpper, Srdjan Capk...