Sciweavers

537 search results - page 62 / 108
» Compiling Exceptions Correctly
Sort
View
ACSAC
2006
IEEE
14 years 3 months ago
How to Automatically and Accurately Sandbox Microsoft IIS
Comparing the system call sequence of a network application against a sandboxing policy is a popular approach to detecting control-hijacking attack, in which the attacker exploits...
Wei Li, Lap-Chung Lam, Tzi-cker Chiueh
MICRO
2005
IEEE
105views Hardware» more  MICRO 2005»
14 years 2 months ago
Incremental Commit Groups for Non-Atomic Trace Processing
We introduce techniques to support efficient non-atomic execution of very long traces on a new binary translation based, x86-64 compatible VLIW microprocessor. Incrementally comm...
Matt T. Yourst, Kanad Ghose
BMCBI
2010
130views more  BMCBI 2010»
13 years 9 months ago
A statistical approach to finding overlooked genetic associations
Background: Complexity and noise in expression quantitative trait loci (eQTL) studies make it difficult to distinguish potential regulatory relationships among the many interactio...
Andrew K. Rider, Geoffrey Siwo, Nitesh V. Chawla, ...
DC
2008
13 years 9 months ago
On implementing omega in systems with weak reliability and synchrony assumptions
We study the feasibility and cost of implementing --a fundamental failure detector at the core of many algorithms--in systems with weak reliability and synchrony assumptions. Intui...
Marcos Kawazoe Aguilera, Carole Delporte-Gallet, H...
ICCV
2005
IEEE
14 years 11 months ago
Geometric Invariants and Applications under Catadioptric Camera Model
This paper presents geometric invariants of points and their applications under central catadioptric camera model. Although the image has severe distortions under the model, we es...
Yihong Wu, Zhanyi Hu