Sciweavers

2081 search results - page 218 / 417
» codes 2006
Sort
View
JOT
2010
113views more  JOT 2010»
14 years 9 months ago
SOA Web Security and Applications
entional vulnerability detection fails to extend its generic form to an abstract level in coping with particular type of string validation. Consequently the security bypasses key ...
Raymond Wu, Masayuki Hisada
JSAC
2010
84views more  JSAC 2010»
14 years 9 months ago
A little feedback can simplify sensor network cooperation
—Shannon’s discovery of digital communication has shaped the architecture of virtually all communication systems in use today. The digital communication paradigm is built aroun...
Anand D. Sarwate, Michael Gastpar
JSS
2010
91views more  JSS 2010»
14 years 9 months ago
Assessing the impact of global variables on program dependence and dependence clusters
This paper presents results of a study of the effect of global variables on the quantity of dependence in general and on the presence of dependence clusters in particular. The pa...
David Binkley, Mark Harman, Youssef Hassoun, Syed ...
CODES
2006
IEEE
15 years 5 months ago
Resource virtualization in real-time CORBA middleware
Middleware for parallel and distributed systems is designed to virtualize computation and communication resources so that a more and consistent view of those resources is presente...
Christopher D. Gill
CODES
2006
IEEE
15 years 5 months ago
The pipeline decomposition tree: : an analysis tool for multiprocessor implementation of image processing applications
Modern embedded systems for image processing involve increasingly complex levels of functionality under real-time and resourcerelated constraints. As this complexity increases, th...
Dong-Ik Ko, Shuvra S. Bhattacharyya