Sciweavers

172 search results - page 26 / 35
» Filter Flow
Sort
View
DSN
2007
IEEE
14 years 27 days ago
Augmenting Branch Predictor to Secure Program Execution
Although there are various ways to exploit software vulnerabilities for malicious attacks, the attacks always result in unexpected behavior in program execution, deviating from wh...
Yixin Shi, Gyungho Lee
IJNSEC
2008
201views more  IJNSEC 2008»
13 years 9 months ago
Detecting and Preventing IP-spoofed Distributed DoS Attacks
In this paper, we explore mechanisms for defending against Distributed Denial of Service (DDoS) attacks, have become one of the major threats to the operation of the Internet toda...
Yao Chen, Shantanu Das, Pulak Dhar, Abdulmotaleb E...
TMI
2002
386views more  TMI 2002»
13 years 8 months ago
Tracking Leukocytes In Vivo with Shape and Size Constrained Active Contours
Inflammatory disease is initiated by leukocytes (white blood cells) rolling along the inner surface lining of small blood vessels called postcapillary venules. Studying the number ...
Nilanjan Ray, Scott T. Acton, Klaus Ley
TREC
2008
13 years 10 months ago
UTDallas at TREC 2008 Blog Track
This paper describes our participation in the 2008 TREC Blog track. Our system consists of 3 components: data preprocessing, topic retrieval, and opinion finding. In the topic ret...
Bin Li, Feifan Liu, Yang Liu
CVPR
2010
IEEE
14 years 5 months ago
Fast Global Optimization of Curvature
Two challenges in computer vision are to accommodate noisy data and missing data. Many problems in computer vision, such as segmentation, filtering, stereo, reconstruction, inpain...
Noha El-Zehiry, Leo Grady