Sciweavers

26957 search results - page 109 / 5392
» Information Systems Modernization
Sort
View
USS
2010
13 years 7 months ago
Cling: A Memory Allocator to Mitigate Dangling Pointers
Use-after-free vulnerabilities exploiting so-called dangling pointers to deallocated objects are just as dangerous as buffer overflows: they may enable arbitrary code execution. U...
Periklis Akritidis
PETRA
2009
ACM
14 years 4 months ago
A technological infrastructure design for a pediatric oncology network
In Italy, the service of Pediatric oncology is very centralized and granted by high-specialized medical structures. In the Italian Regione Campania there are just few of such medi...
Aniello Murano
CCS
2007
ACM
14 years 3 months ago
Shunting: a hardware/software architecture for flexible, high-performance network intrusion prevention
Stateful, in-depth, inline traffic analysis for intrusion detection and prevention is growing increasingly more difficult as the data rates of modern networks rise. Yet it remai...
José M. González, Vern Paxson, Nicho...
ENTCS
2007
104views more  ENTCS 2007»
13 years 9 months ago
Lazy Context Cloning for Non-Deterministic Graph Rewriting
We define a rewrite strategy for a class of non-confluent constructor-based term graph rewriting systems and discuss its correctness. Our strategy and its extension to narrowing...
Sergio Antoy, Daniel W. Brown, Su-Hui Chiang
MODELS
2010
Springer
13 years 8 months ago
Transformation-Based Parallelization of Request-Processing Applications
Abstract. Multicore, multithreaded processors are rapidly becoming the platform of choice for high-throughput request-processing applications (RPAs). We refer to this class of mode...
Taylor L. Riché, Harrick M. Vin, Don S. Bat...