Sciweavers

168 search results - page 25 / 34
» A new perspective on feasibility determination
Sort
View
CCS
2003
ACM
14 years 26 days ago
Countering code-injection attacks with instruction-set randomization
We describe a new, general approach for safeguarding systems against any type of code-injection attack. We apply Kerckhoff’s principle, by creating process-specific randomized ...
Gaurav S. Kc, Angelos D. Keromytis, Vassilis Preve...
FSTTCS
2009
Springer
14 years 8 days ago
Bounded Size Graph Clustering with Applications to Stream Processing
We introduce a graph clustering problem motivated by a stream processing application. Input to our problem is an undirected graph with vertex and edge weights. A cluster is a subse...
Rohit Khandekar, Kirsten Hildrum, Sujay Parekh, De...
CAV
2010
Springer
239views Hardware» more  CAV 2010»
13 years 9 months ago
Universal Causality Graphs: A Precise Happens-Before Model for Detecting Bugs in Concurrent Programs
Triggering errors in concurrent programs is a notoriously difficult task. A key reason for this is the behavioral complexity resulting from the large number of interleavings of op...
Vineet Kahlon, Chao Wang
BLISS
2009
IEEE
13 years 8 months ago
Gait Recognition Using Shadow Analysis
The exploitation of biometrics information in human shadow silhouettes (shadow biometrics), derived from video imagery after processing by gait analysis methods opens new avenues ...
Yumi Iwashita, Adrian Stoica
BMCBI
2005
95views more  BMCBI 2005»
13 years 7 months ago
Oligomeric protein structure networks: insights into protein-protein interactions
Background: Protein-protein association is essential for a variety of cellular processes and hence a large number of investigations are being carried out to understand the princip...
K. V. Brinda, Saraswathi Vishveshwara