Sciweavers

635 search results - page 78 / 127
» Four states are enough!
Sort
View
CCS
2005
ACM
14 years 3 months ago
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits
Vulnerabilities that allow worms to hijack the control flow of each host that they spread to are typically discovered months before the worm outbreak, but are also typically disc...
Jedidiah R. Crandall, Zhendong Su, Shyhtsun Felix ...
ICS
2005
Tsinghua U.
14 years 3 months ago
What is worth learning from parallel workloads?: a user and session based analysis
Learning useful and predictable features from past workloads and exploiting them well is a major source of improvement in many operating system problems. We review known parallel ...
Julia Zilber, Ofer Amit, David Talby
ISRR
2005
Springer
140views Robotics» more  ISRR 2005»
14 years 3 months ago
Tradeoffs Between Directed and Autonomous Driving on the Mars Exploration Rovers
NASA’s Mars Exploration Rovers (MER) have collected a great diversity of geological science results, thanks in large part to their surface mobility capabilities. The six wheel r...
Jeffrey J. Biesiadecki, Chris Leger, Mark W. Maimo...
MOZ
2004
Springer
14 years 3 months ago
The Structure of Authority: Why Security Is Not a Separable Concern
Common programming practice grants excess authority for the sake of functionality; programming principles require least authority for the sake of security. If we practice our princ...
Mark S. Miller, Bill Tulloh, Jonathan S. Shapiro
IUI
2003
ACM
14 years 3 months ago
A model of textual affect sensing using real-world knowledge
This paper presents a novel way for assessing the affective qualities of natural language and a scenario for its use. Previous approaches to textual affect sensing have employed k...
Hugo Liu, Henry Lieberman, Ted Selker