Sciweavers

1005 search results - page 117 / 201
» Information systems security engineering: a critical compone...
Sort
View
CACM
2008
131views more  CACM 2008»
13 years 9 months ago
Exterminator: Automatically correcting memory errors with high probability
Programs written in C and C++ are susceptible to memory errors, including buffer overflows and dangling pointers. These errors, which can lead to crashes, erroneous execution, and...
Gene Novark, Emery D. Berger, Benjamin G. Zorn
EUROSYS
2009
ACM
14 years 6 months ago
Orchestra: intrusion detection using parallel execution and monitoring of program variants in user-space
In a Multi-Variant Execution Environment (MVEE), several slightly different versions of the same program are executed in lockstep. While this is done, a monitor compares the behav...
Babak Salamat, Todd Jackson, Andreas Gal, Michael ...
EMSOFT
2001
Springer
14 years 1 months ago
Adaptive and Reflective Middleware for Distributed Real-Time and Embedded Systems
Software has become strategic to developing effective distributed real-time and embedded (DRE) systems. Next-generation DRE systems, such as total ship computing environments, coo...
Douglas C. Schmidt
ADC
2003
Springer
106views Database» more  ADC 2003»
14 years 2 months ago
Database Component Ware
Database modeling is still a job of an artisan. Due to this approach database schemata evolve by growth without any evolution plan. Finally, they cannot be examined, surveyed, con...
Bernhard Thalheim
PAKDD
2001
ACM
157views Data Mining» more  PAKDD 2001»
14 years 1 months ago
Applying Pattern Mining to Web Information Extraction
Information extraction (IE) from semi-structured Web documents is a critical issue for information integration systems on the Internet. Previous work in wrapper induction aim to so...
Chia-Hui Chang, Shao-Chen Lui, Yen-Chin Wu