Attackers exploit software vulnerabilities to control or crash programs. Bouncer uses existing software instrumentation techniques to detect attacks and it generates filters auto...
Manuel Costa, Miguel Castro, Lidong Zhou, Lintao Z...
Predicate dispatching is a generalized form of dynamic dispatch, which has strong limitations when arbitrary predicates of the underlying base language are used. Unlike classes, w...
Pascal Costanza, Charlotte Herzeel, Jorge Vallejos...
A method for the simultaneous localization and recognition of dynamic hand gestures is proposed. At the core of this method is a dynamic space-time warping (DSTW) algorithm, that ...
Jonathan Alon, Vassilis Athitsos, Quan Yuan, Stan ...
Configurability is a major issue in the domain of embedded system software. Existing systems specifically lack good techniques to implement configurability of architectural OS con...
Daniel Lohmann, Jochen Streicher, Olaf Spinczyk, W...
Increasing applications are demanding effective and efficient support to perform retrieval in large collections of digital images. The work presented here is an early stage resear...
Giovanna Castellano, Gianluca Sforza, Maria Alessa...