Sciweavers

12336 search results - page 2398 / 2468
» Active Information Retrieval
Sort
View
ICIP
2008
IEEE
14 years 11 months ago
Spect image restoration via Recursive Inverse Filtering constrained by a probabilistic MRI atlas
3D Brain SPECT imagery is a well established functional imaging method which has become a great help to physicians in the diagnosis of several neurological and cerebrovascular dis...
Said Benameur, Max Mignotte, Jean-Paul Soucy, Jean...
VIS
2006
IEEE
214views Visualization» more  VIS 2006»
14 years 11 months ago
Hub-based Simulation and Graphics Hardware Accelerated Visualization for Nanotechnology Applications
The Network for Computational Nanotechnology (NCN) has developed a science gateway at nanoHUB.org for nanotechnology education and research. Remote users can browse through online...
Wei Qiao, Michael McLennan, Rick Kennell, David...
DAC
2007
ACM
14 years 11 months ago
A System For Coarse Grained Memory Protection In Tiny Embedded Processors
Many embedded systems contain resource constrained microcontrollers where applications, operating system components and device drivers reside within a single address space with no...
Ram Kumar, Akhilesh Singhania, Andrew Castner, Edd...
ICSE
2008
IEEE-ACM
14 years 10 months ago
Static detection of cross-site scripting vulnerabilities
Web applications support many of our daily activities, but they often have security problems, and their accessibility makes them easy to exploit. In cross-site scripting (XSS), an...
Gary Wassermann, Zhendong Su
SIGSOFT
2003
ACM
14 years 10 months ago
Protecting C programs from attacks via invalid pointer dereferences
Writes via unchecked pointer dereferences rank high among vulnerabilities most often exploited by malicious code. The most common attacks use an unchecked string copy to cause a b...
Suan Hsi Yong, Susan Horwitz
« Prev « First page 2398 / 2468 Last » Next »