Sciweavers

1636 search results - page 130 / 328
» Detecting similar software applications
Sort
View
VEE
2006
ACM
142views Virtualization» more  VEE 2006»
15 years 10 months ago
Secure and practical defense against code-injection attacks using software dynamic translation
One of the most common forms of security attacks involves exploiting a vulnerability to inject malicious code into an executing application and then cause the injected code to be ...
Wei Hu, Jason Hiser, Daniel Williams, Adrian Filip...
ECBS
2005
IEEE
179views Hardware» more  ECBS 2005»
15 years 10 months ago
Prototype of Fault Adaptive Embedded Software for Large-Scale Real-Time Systems
This paper describes a comprehensive prototype of large-scale fault adaptive embedded software developed for the proposed Fermilab BTeV high energy physics experiment. Lightweight...
Derek Messie, Mina Jung, Jae C. Oh, Shweta Shetty,...
CCGRID
2001
IEEE
15 years 8 months ago
NwsAlarm: A Tool for Accurately Detecting Resource Performance Degradation
End-users of high-performance computing resources have come to expect that consistent levels of performance be delivered to their applications. The advancement of the Computationa...
Chandra Krintz, Richard Wolski
SAC
2006
ACM
15 years 10 months ago
Detecting identifiable areas in mobile environments
Location-based applications and services are getting increasingly important for mobile users. They take into account a mobile user's current location and provide a location-d...
Jörg Roth
SIAMIS
2011
14 years 11 months ago
A New Geometric Metric in the Space of Curves, and Applications to Tracking Deforming Objects by Prediction and Filtering
We define a novel metric on the space of closed planar curves which decomposes into three intuitive components. According to this metric centroid translations, scale changes and ...
Ganesh Sundaramoorthi, Andrea Mennucci, Stefano So...