Sciweavers

766 search results - page 83 / 154
» Detecting modifications in paper documents: a coding approac...
Sort
View
CSREAESA
2008
13 years 10 months ago
A Middleware for Model-Based Embedded Systems
To deal with the increasing complexity of embedded real-time systems the model-driven development approach has proven to be beneficial. The reduction of complexity achieved by the ...
Wolfgang Haberl, Jan Birke, Uwe Baumgarten
ACSAC
2010
IEEE
13 years 5 months ago
Heap Taichi: exploiting memory allocation granularity in heap-spraying attacks
Heap spraying is an attack technique commonly used in hijacking browsers to download and execute malicious code. In this attack, attackers first fill a large portion of the victim...
Yu Ding, Tao Wei, Tielei Wang, Zhenkai Liang, Wei ...
WM
2003
13 years 10 months ago
Ontologies in Cross-Language Information Retrieval
: We present an approach to using ontologies as interlingua in cross-language information retrieval in the medical domain. Our approach is based on using the Unified Medical Langu...
Martin Volk, Spela Vintar, Paul Buitelaar
ACSC
2006
IEEE
14 years 3 months ago
Manufacturing opaque predicates in distributed systems for code obfuscation
Code obfuscation is a relatively new technique of software protection and it works by deterring reverse engineering attempts by malicious users of software. The objective of obfus...
Anirban Majumdar, Clark D. Thomborson
GPCE
2003
Springer
14 years 2 months ago
Making Patterns Explicit with Metaprogramming
Abstract. Design patterns have been a useful tool for a better understanding of the collaboration between several classes and objects in a program. One drawback of this approach is...
Daniel von Dincklage