Sciweavers

653 search results - page 107 / 131
» Enhancing Commitment Machines
Sort
View
CISC
2006
Springer
81views Cryptology» more  CISC 2006»
14 years 2 months ago
Return Address Randomization Scheme for Annuling Data-Injection Buffer Overflow Attacks
Buffer overflow(BOF) has been the most common form of vulnerability in software systems today, and many methods exist to defend software systems against BOF attacks. Among them, th...
Deok Jin Kim, Tae Hyung Kim, Jong Kim, Sung Je Hon...
CASES
2000
ACM
14 years 2 months ago
Flexible instruction processors
This paper introduces the notion of a Flexible Instruction Processor (FIP) for systematic customisation of instruction processor design and implementation. The features of our app...
Shay Ping Seng, Wayne Luk, Peter Y. K. Cheung
AUSDM
2008
Springer
243views Data Mining» more  AUSDM 2008»
14 years 1 months ago
Structure-Based Document Model with Discrete Wavelet Transforms and Its Application to Document Classification
Term signal is an existing text representation that depicts a term as a vector of frequencies of occurrences in a number of user-defined partitions of a document. Although term si...
Supphachai Thaicharoen, Tom Altman, Krzysztof J. C...
DIM
2005
ACM
14 years 1 months ago
Usable presentation of secure pseudonyms
Privacy-Enhancing Identity Management (PIM) enables users to control which personal information they provide to their communication partner(s) by partitioning their personal infor...
Katrin Borcea-Pfitzmann, Elke Franz, Andreas Pfitz...
IJCAI
2007
14 years 19 days ago
Augmented Experiment: Participatory Design with Multiagent Simulation
To test large scale socially embedded systems, this paper proposes a multiagent-based participatory design that consists of two steps; 1) participatory simulation, where scenario-...
Toru Ishida, Yuu Nakajima, Yohei Murakami, Hideyuk...