Sciweavers

193 search results - page 32 / 39
» pervasive 2010
Sort
View
CONEXT
2010
ACM
14 years 7 months ago
Assessing the vulnerability of replicated network services
Client-server networks are pervasive, fundamental, and include such key networks as the Internet, power grids, and road networks. In a client-server network, clients obtain a serv...
George Dean Bissias, Brian Neil Levine, Ramesh K. ...
EMNLP
2010
14 years 7 months ago
Utilizing Extra-Sentential Context for Parsing
Syntactic consistency is the preference to reuse a syntactic construction shortly after its appearance in a discourse. We present an analysis of the WSJ portion of the Penn Treeba...
Jackie Chi Kit Cheung, Gerald Penn
SIGSOFT
2010
ACM
14 years 7 months ago
Software engineering and wireless sensor networks: happy marriage or consensual divorce?
The development of wireless sensor networks (WSNs) software today is tackled by a code-and-fix process that relies solely on the primitive constructs provided by the operating sys...
Gian Pietro Picco
SMC
2010
IEEE
193views Control Systems» more  SMC 2010»
14 years 7 months ago
A cooperative approach for handshake detection based on body sensor networks
The handshake gesture is an important part of the social etiquette in many cultures. It lies at the core of many human interactions, either in formal or informal settings: exchangi...
Antonio Augimeri, Giancarlo Fortino, Manoj R. Rege...
88
Voted
USS
2010
14 years 7 months ago
Cling: A Memory Allocator to Mitigate Dangling Pointers
Use-after-free vulnerabilities exploiting so-called dangling pointers to deallocated objects are just as dangerous as buffer overflows: they may enable arbitrary code execution. U...
Periklis Akritidis