Abstract. The informative resources available on the Web are not always directly accessible and cannot therefore be crawled since access is permitted only through the adoption of a...
Emanuele Di Buccio, Ivano Masiero, Massimo Melucci
Rich applications merge classical computing, client-server concurrency, web-based interfaces, and the complex time- and eventbased reactive programming found in embedded systems. T...
Abstract. Although gossiping protocols for wireless sensor networks (sensornets) excel at minimizing the number of generated packets, they leave room for improvement when it comes ...
Tomasz Pazurkiewicz, Michal Gregorczyk, Konrad Iwa...
Abstract. As the explosion of data sizes continues to push the limits of our abilities to efficiently store and process big data, next generation big data systems face multiple ch...
Abstract. Code reuse attacks circumvent traditional program protection mechanisms such as W ⊕ X by constructing exploits from code already present within a process. Existing tech...
Emily R. Jacobson, Andrew R. Bernat, William R. Wi...
Abstract. The design of anonymous communication systems is a relatively new field, but the desire to quantify the security these systems offer has been an important topic of rese...
Abstract. Memory transactions provide programmers with a convestraction for concurrent programs: a keyword (such as atomic) designating a region of code that appears, from the pers...
Abstract. Relevance judgments are often the most expensive part of information retrieval evaluation, and techniques for comparing retrieval systems using fewer relevance judgments ...