Sciweavers

766 search results - page 32 / 154
» Detecting modifications in paper documents: a coding approac...
Sort
View
DIMVA
2007
13 years 9 months ago
A Study of Malcode-Bearing Documents
By exploiting the object-oriented dynamic composability of modern document applications and formats, malcode hidden in otherwise inconspicuous documents can reach third-party appli...
Wei-Jen Li, Salvatore J. Stolfo, Angelos Stavrou, ...
DATE
2009
IEEE
135views Hardware» more  DATE 2009»
14 years 2 months ago
System-level hardware-based protection of memories against soft-errors
We present a hardware-based approach to improve the resilience of a computer system against the errors occurred in the main memory with the help of error detecting and correcting ...
Valentin Gherman, Samuel Evain, Mickael Cartron, N...
ADBIS
2010
Springer
181views Database» more  ADBIS 2010»
13 years 9 months ago
Stones Falling in Water: When and How to Restructure a View-Based Relational Database
Nowadays, one of the most important problems of software engineering continues to be the maintenance of both databases and applications. It is clear that any method that can reduce...
Eladio Domínguez, Jorge Lloret, Angel Luis ...
CLEF
2010
Springer
13 years 8 months ago
Exploring Fingerprinting as External Plagiarism Detection Method - Lab Report for PAN at CLEF 2010
This paper outlines the main approach and the general design of the plagiarism detection prototype application we have developed to take part in the 2nd International Plagiarism De...
Yurii Palkovskii, Alexei Belov, Irina Muzika
DFT
1999
IEEE
139views VLSI» more  DFT 1999»
14 years 2 days ago
Soft-Error Detection through Software Fault-Tolerance Techniques
The paper describes a systematic approach for automatically introducing data and code redundancy into an existing program written using a high-level language. The transformations ...
Maurizio Rebaudengo, Matteo Sonza Reorda, Marco To...