Sciweavers

800 search results - page 105 / 160
» XML access control using static analysis
Sort
View
ICCS
2004
Springer
15 years 8 months ago
Simulation Coercion Applied to Multiagent DDDAS
Abstract. The unpredictable run-time configurations of dynamic, datadriven application systems require flexible simulation components that can adapt to changes in the number of i...
Yannick Loitière, David C. Brogan, Paul F. ...
143
Voted
EMSOFT
2001
Springer
15 years 7 months ago
An Implementation of Scoped Memory for Real-Time Java
Abstract. This paper presents our experience implementing the memory management extensions in the Real-Time Specification for Java. These extensions are designed to given real-tim...
William S. Beebee, Martin C. Rinard
MSN
2007
Springer
187views Sensor Networks» more  MSN 2007»
15 years 9 months ago
Performance Analysis of IEEE 802.11 in Multi-hop Wireless Networks
Abstract. Multi-hop wireless networks provide a quick and easy way for networking when we need a temporary network or when cabling is difficult. The 802.11 Medium Access Control (M...
Lan Tien Nguyen, Razvan Beuran, Yoichi Shinoda
127
Voted
ACSC
2006
IEEE
15 years 9 months ago
Manufacturing opaque predicates in distributed systems for code obfuscation
Code obfuscation is a relatively new technique of software protection and it works by deterring reverse engineering attempts by malicious users of software. The objective of obfus...
Anirban Majumdar, Clark D. Thomborson
IEEEPACT
2005
IEEE
15 years 9 months ago
Performance Analysis of System Overheads in TCP/IP Workloads
Current high-performance computer systems are unable to saturate the latest available high-bandwidth networks such as 10 Gigabit Ethernet. A key obstacle in achieving 10 gigabits ...
Nathan L. Binkert, Lisa R. Hsu, Ali G. Saidi, Rona...