Sciweavers

314 search results - page 36 / 63
» An Evaluation of the Effectiveness of Measurement-based Anom...
Sort
View
MICRO
2007
IEEE
79views Hardware» more  MICRO 2007»
14 years 1 months ago
Self-calibrating Online Wearout Detection
Technology scaling, characterized by decreasing feature size, thinning gate oxide, and non-ideal voltage scaling, will become a major hindrance to microprocessor reliability in fu...
Jason A. Blome, Shuguang Feng, Shantanu Gupta, Sco...
SP
2010
IEEE
178views Security Privacy» more  SP 2010»
13 years 11 months ago
Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically
The computer systems security arms race between attackers and defenders has largely taken place in the domain of software systems, but as hardware complexity and design processes ...
Matthew Hicks, Murph Finnicum, Samuel T. King, Mil...
ISSTA
2012
ACM
11 years 10 months ago
Undangle: early detection of dangling pointers in use-after-free and double-free vulnerabilities
Use-after-free vulnerabilities are rapidly growing in popularity, especially for exploiting web browsers. Use-afterfree (and double-free) vulnerabilities are caused by a program o...
Juan Caballero, Gustavo Grieco, Mark Marron, Anton...
IVS
2008
121views more  IVS 2008»
13 years 7 months ago
Using treemaps for variable selection in spatio-temporal visualisation
We demonstrate and reflect upon the use of enhanced treemaps that incorporate spatial and temporal ordering for exploring a large multivariate spatio-temporal data set. The result...
Aidan Slingsby, Jason Dykes, Jo Wood
ICASSP
2007
IEEE
14 years 2 months ago
Context-Based Concept Fusion with Boosted Conditional Random Fields
The contextual relationships among different semantic concepts provide important information for automatic concept detection in images/videos. We propose a new context-based conce...
Wei Jiang, Shih-Fu Chang, Alexander C. Loui