Sciweavers

12347 search results - page 2320 / 2470
» Intelligent Integration of Information
Sort
View
139
Voted
ICISS
2010
Springer
15 years 1 months ago
ValueGuard: Protection of Native Applications against Data-Only Buffer Overflows
Abstract. Code injection attacks that target the control-data of an application have been prevalent amongst exploit writers for over 20 years. Today however, these attacks are gett...
Steven Van Acker, Nick Nikiforakis, Pieter Philipp...
IPPS
2010
IEEE
15 years 1 months ago
Scalable failure recovery for high-performance data aggregation
Many high-performance tools, applications and infrastructures, such as Paradyn, STAT, TAU, Ganglia, SuperMon, Astrolabe, Borealis, and MRNet, use data aggregation to synthesize lar...
Dorian C. Arnold, Barton P. Miller
187
Voted
ISW
2010
Springer
15 years 1 months ago
Artificial Malware Immunization Based on Dynamically Assigned Sense of Self
Computer malwares (e.g., botnets, rootkits, spware) are one of the most serious threats to all computers and networks. Most malwares conduct their malicious actions via hijacking t...
Xinyuan Wang, Xuxian Jiang
ICISC
2009
132views Cryptology» more  ICISC 2009»
15 years 1 months ago
Side-Channel Analysis of Cryptographic Software via Early-Terminating Multiplications
Abstract. The design of embedded processors demands a careful tradeoff between many conflicting objectives such as performance, silicon area and power consumption. Finding such a t...
Johann Großschädl, Elisabeth Oswald, Da...
148
Voted
BMCBI
2010
201views more  BMCBI 2010»
15 years 23 days ago
IntelliGO: a new vector-based semantic similarity measure including annotation origin
Background: The Gene Ontology (GO) is a well known controlled vocabulary describing the biological process, molecular function and cellular component aspects of gene annotation. I...
Sidahmed Benabderrahmane, Malika Smaïl-Tabbon...
« Prev « First page 2320 / 2470 Last » Next »