Sciweavers

990 search results - page 183 / 198
» A Static Analysis Technique for Graph Transformation Systems
Sort
View
SP
2010
IEEE
174views Security Privacy» more  SP 2010»
13 years 11 months ago
HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity
— Virtualization is being widely adopted in today’s computing systems. Its unique security advantages in isolating and introspecting commodity OSes as virtual machines (VMs) ha...
Zhi Wang, Xuxian Jiang
DAGM
2004
Springer
14 years 1 months ago
Silhouette Based Human Motion Estimation
This paper proposes a system for model based human motion estimation. We start with a human model generation system, which uses a set of input images to automatically generate a f...
Bodo Rosenhahn, Reinhard Klette, Gerald Sommer
PLDI
2009
ACM
14 years 2 months ago
Staged information flow for javascript
Modern websites are powered by JavaScript, a flexible dynamic scripting language that executes in client browsers. A common paradigm in such websites is to include third-party Ja...
Ravi Chugh, Jeffrey A. Meister, Ranjit Jhala, Sori...
ICMCS
2007
IEEE
131views Multimedia» more  ICMCS 2007»
14 years 2 months ago
Image Source Coding Forensics via Intrinsic Fingerprints
In this digital era, digital multimedia contents are often transmitted over networks without any protection. This raises serious security concerns since the receivers/subscribers ...
Wan-Yi Sabrina Lin, Steven Tjoa, H. Vicky Zhao, K....
ESOP
2005
Springer
14 years 1 months ago
A New Foundation for Control-Dependence and Slicing for Modern Program Structures
The notion of control dependence underlies many program analysis and transformation techniques used in numerous applications. Despite wide application, existing definitions and ap...
Venkatesh Prasad Ranganath, Torben Amtoft, Anindya...