Sciweavers

381 search results - page 54 / 77
» host 2008
Sort
View
IEEEARES
2008
IEEE
15 years 11 months ago
Type and Effect Annotations for Safe Memory Access in C
In this paper, we present a novel type and effect analysis for detecting memory errors in C source code. We extend the standard C type system with effect, region, and host annotat...
Syrine Tlili, Mourad Debbabi
INFOCOM
2008
IEEE
15 years 11 months ago
Non-Metric Coordinates for Predicting Network Proximity
—We consider the problem of determining the “closest”, or best Internet host to connect to, from a list of candidate servers. Most existing approaches rely on the use of metr...
Peter B. Key, Laurent Massoulié, Dan-Cristi...
INFOCOM
2008
IEEE
15 years 11 months ago
Spatial-Temporal Characteristics of Internet Malicious Sources
—This paper presents a large scale longitudinal study of the spatial and temporal features of malicious source addresses. The basis of our study is a 402-day trace of over 7 bill...
Zesheng Chen, Chuanyi Ji, Paul Barford
IROS
2008
IEEE
108views Robotics» more  IROS 2008»
15 years 11 months ago
Synchronous imitation control for biped robot based on wearable human motion analysis system
— To achieve accurate and efficient interaction with humans, robot training is indispensable to make robot cooperate with different host. We are focusing on development of a huma...
Tao Liu, H. Utsunomiya, Yoshio Inoue, Kyoko Shibat...
ISM
2008
IEEE
176views Multimedia» more  ISM 2008»
15 years 11 months ago
BitTube: Case Study of a Web-Based Peer-Assisted Video-on-Demand System
Recent theoretical and simulation-based studies have confirmed the tremendous benefit of peer-to-peer (P2P) communication at reducing the cost of running a VoD service. To date,...
Bo Liu, Yi Cui, Bin Chang, Ben Gotow, Yuan Xue