Sciweavers

1804 search results - page 279 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
ICDAR
2009
IEEE
14 years 3 months ago
Text Line Segmentation Based on Morphology and Histogram Projection
Text extraction is an important phase in document recognition systems. In order to segment text from a page document it is necessary to detect all the possible manuscript text reg...
Rodolfo P. dos Santos, Gabriela S. Clemente, Ing R...
CCS
2010
ACM
13 years 9 months ago
Return-oriented programming without returns
We show that on both the x86 and ARM architectures it is possible to mount return-oriented programming attacks without using return instructions. Our attacks instead make use of c...
Stephen Checkoway, Lucas Davi, Alexandra Dmitrienk...
WWW
2007
ACM
14 years 9 months ago
Consistency-preserving caching of dynamic database content
With the growing use of dynamic web content generated from relational databases, traditional caching solutions for throughput and latency improvements are ineffective. We describe...
Niraj Tolia, M. Satyanarayanan
HICSS
2007
IEEE
105views Biometrics» more  HICSS 2007»
14 years 3 months ago
Juggling Work Among Multiple Projects and Partner
Prior research suggests people have trouble juggling effort across multiple projects with multiple partners. We investigated this problem, with an experiment where groups of four ...
Peter Scupelli, Susan R. Fussell, Sara B. Kiesler,...
POPL
1998
ACM
14 years 1 months ago
A Type System for Java Bytecode Subroutines
Java is typically compiled into an intermediate language, JVML, that is interpreted by the Java Virtual Machine. Because mobile JVML code is not always trusted, a bytecode verifi...
Raymie Stata, Martín Abadi