Sciweavers

3086 search results - page 501 / 618
» Generalized Discriminant Analysis Using a Kernel Approach
Sort
View
152
Voted
MICRO
1998
IEEE
144views Hardware» more  MICRO 1998»
15 years 6 months ago
Analyzing the Working Set Characteristics of Branch Execution
To achieve highly accurate branch prediction, it is necessary not only to allocate more resources to branch prediction hardware but also to improve the understanding of branch exe...
Sangwook P. Kim, Gary S. Tyson
PAMI
2007
336views more  PAMI 2007»
15 years 2 months ago
Topological Equivalence between a 3D Object and the Reconstruction of Its Digital Image
— Digitization is not as easy as it looks. If one digitizes a 3D object even with a dense sampling grid, the reconstructed digital object may have topological distortions and in ...
Peer Stelldinger, Longin Jan Latecki, Marcelo Siqu...
KBSE
2010
IEEE
15 years 1 months ago
Solving string constraints lazily
Decision procedures have long been a fixture in program analysis, and reasoning about string constraints is a key element in many program analyses and testing frameworks. Recent ...
Pieter Hooimeijer, Westley Weimer
155
Voted
CCS
2011
ACM
14 years 2 months ago
Fear the EAR: discovering and mitigating execution after redirect vulnerabilities
The complexity of modern web applications makes it difficult for developers to fully understand the security implications of their code. Attackers exploit the resulting security v...
Adam Doupé, Bryce Boe, Christopher Kruegel,...
172
Voted
VEE
2012
ACM
238views Virtualization» more  VEE 2012»
13 years 10 months ago
Replacement attacks against VM-protected applications
Process-level virtualization is increasingly being used to enhance the security of software applications from reverse engineering and unauthorized modification (called software p...
Sudeep Ghosh, Jason Hiser, Jack W. Davidson