Sciweavers

9209 search results - page 29 / 1842
» Data Space Randomization
Sort
View
CORR
2010
Springer
167views Education» more  CORR 2010»
13 years 9 months ago
Security Mitigations for Return-Oriented Programming Attacks
With the discovery of new exploit techniques, new protection mechanisms are needed as well. Mitigations like DEP (Data Execution Prevention) or ASLR (Address Space Layout Randomiz...
Piotr Bania
CORR
2010
Springer
135views Education» more  CORR 2010»
13 years 9 months ago
JIT Spraying and Mitigations
With the discovery of new exploit techniques, novel protection mechanisms are needed as well. Mitigations like DEP (Data Execution Prevention) or ASLR (Address Space Layout Random...
Piotr Bania
RTCSA
1999
IEEE
14 years 1 months ago
Non-Blocking Data Sharing in Multiprocessor Real-Time Systems
A non-blocking protocol that allows real-time tasks to share data in a multiprocessor system is presented in this paper. The protocol gives the means to concurrent real-time tasks...
Philippas Tsigas, Yi Zhang
TIT
2002
99views more  TIT 2002»
13 years 9 months ago
Poisson intensity estimation for tomographic data using a wavelet shrinkage approach
We consider a two-dimensional problem of positron emission tomography where the random mechanism of the generation of the tomographic data is modeled by Poisson processes. The goa...
L. Cavalier, Ja-Yong Koo