Sciweavers

766 search results - page 113 / 154
» Detecting modifications in paper documents: a coding approac...
Sort
View
ISCA
2012
IEEE
248views Hardware» more  ISCA 2012»
11 years 11 months ago
Watchdog: Hardware for safe and secure manual memory management and full memory safety
Languages such as C and C++ use unsafe manual memory management, allowing simple bugs (i.e., accesses to an object after deallocation) to become the root cause of exploitable secu...
Santosh Nagarakatte, Milo M. K. Martin, Steve Zdan...
DOCENG
2004
ACM
14 years 2 months ago
Behavioral reactivity and real time programming in XML: functional programming meets SMIL animation
XML and its associated languages are emerging as powerful authoring tools for multimedia and hypermedia web content. Furthermore, intelligent presentation generation engines have ...
Peter R. King, Patrick Schmitz, Simon J. Thompson
IJSNET
2007
97views more  IJSNET 2007»
13 years 9 months ago
Stochastic binary sensor networks for noisy environments
— This paper proposes a stochastic framework for detecting anomalies or gathering interesting events in a noisy environment using a sensor network consisting of binary sensors. A...
T. Nguyen, Dong Nguyen, Huaping Liu, Duc A. Tran
CODES
2006
IEEE
14 years 3 months ago
Hardware assisted pre-emptive control flow checking for embedded processors to improve reliability
Reliability in embedded processors can be improved by control flow checking and such checking can be conducted using software or hardware. Proposed software-only approaches suffe...
Roshan G. Ragel, Sri Parameswaran
ESORICS
2010
Springer
13 years 10 months ago
Web Browser History Detection as a Real-World Privacy Threat
Web browser history detection using CSS visited styles has long been dismissed as an issue of marginal impact. However, due to recent changes in Web usage patterns, coupled with br...
Artur Janc, Lukasz Olejnik