Sciweavers

519 search results - page 63 / 104
» Control flow obfuscation with information flow tracking
Sort
View
PLDI
1990
ACM
14 years 26 days ago
A Fresh Look at Optimizing Array Bound Checking
- This paper describes techniques for optimizing range checks performed to detect array bound violations. In addition to the elimination of range check:s, the optimizations discuss...
Rajiv Gupta
ERCIMDL
1998
Springer
133views Education» more  ERCIMDL 1998»
14 years 1 months ago
MarketNet: Using Virtual Currency to Protect Information Systems
This paper describes novel market-based technologies for systematic, quantifiable and predictable protection of information systems against attacks. These technologies, incorporate...
Yechiam Yemini, Apostolos Dailianas, Danilo Floris...
CDC
2008
IEEE
166views Control Systems» more  CDC 2008»
13 years 10 months ago
Distributed coverage verification in sensor networks without location information
In this paper, we present a series of distributed algorithms for coverage verification in sensor networks with no location information. We demonstrate how, in the absence of locali...
Alireza Tahbaz-Salehi, Ali Jadbabaie
SAS
2000
Springer
14 years 12 days ago
Flattening Is an Improvement
d Abstract) James Riely1 and Jan Prins2 1 DePaul University 2 University of North Carolina at Chapel Hill Abstract. Flattening is a program transformation that eliminates nested pa...
James Riely, Jan Prins
ICMI
2010
Springer
160views Biometrics» more  ICMI 2010»
13 years 6 months ago
Facilitating multiparty dialog with gaze, gesture, and speech
We study how synchronized gaze, gesture and speech rendered by an embodied conversational agent can influence the flow of conversations in multiparty settings. We review a computa...
Dan Bohus, Eric Horvitz