Sciweavers

436 search results - page 42 / 88
» A Note on Negligible Functions
Sort
View
129
Voted
IJISEC
2006
106views more  IJISEC 2006»
15 years 3 months ago
Execution transactions for defending against software failures: use and evaluation
We examine the problem of containing buffer overflow attacks in a safe and efficient manner. Briefly, we automatically augment source code to dynamically catch stack and heap-based...
Stelios Sidiroglou, Angelos D. Keromytis
141
Voted
COMGEO
2004
ACM
15 years 3 months ago
A multi-dimensional approach to force-directed layouts of large graphs
We present a novel hierarchical force-directed method for drawing large graphs. Given a graph G = (V,E), the algorithm produces an embedding for G in an Euclidean space E of any d...
Pawel Gajer, Michael T. Goodrich, Stephen G. Kobou...
143
Voted
IAJIT
2010
157views more  IAJIT 2010»
15 years 2 months ago
Fast Cryptographic Privacy Preserving Association Rules Mining on Distributed Homogenous Database
: Privacy is one of the most important properties of an information system must satisfy, in which systems the need to share information among different, not trusted entities, the p...
Ashraf El-Sisi
152
Voted
KES
2008
Springer
15 years 2 months ago
Fast Cryptographic Privacy Preserving Association Rules Mining on Distributed Homogenous Data Base
Privacy is one of the most important properties of an information system must satisfy. In which systems the need to share information among different, not trusted entities, the pro...
Mahmoud Hussein, Ashraf El-Sisi, Nabil A. Ismail
123
Voted
GLOBECOM
2010
IEEE
15 years 1 months ago
Performance Evaluation of Network Mobility Handover over Future Aeronautical Data Link
The aviation community is currently working on the standardization of data communication systems for the future air traffic management. In this context, the ICAO and EUROCONTROL ar...
Serkan Ayaz, Felix Hoffmann, Christoph Sommer, Rei...