Sciweavers

3155 search results - page 559 / 631
» Maintenance: Less Is Not More
Sort
View
RAID
2005
Springer
14 years 3 months ago
Defending Against Injection Attacks Through Context-Sensitive String Evaluation
Abstract. Injection vulnerabilities pose a major threat to applicationlevel security. Some of the more common types are SQL injection, crosssite scripting and shell injection vulne...
Tadeusz Pietraszek, Chris Vanden Berghe
CASES
2004
ACM
14 years 3 months ago
Reducing both dynamic and leakage energy consumption for hard real-time systems
While the dynamic voltage scaling (DVS) techniques are efficient in reducing the dynamic energy consumption for the processor, varying voltage alone becomes less effective for t...
Linwei Niu, Gang Quan
CF
2004
ACM
14 years 3 months ago
Combining compiler and runtime IPC predictions to reduce energy in next generation architectures
Next generation architectures will require innovative solutions to reduce energy consumption. One of the trends we expect is more extensive utilization of compiler information dir...
Saurabh Chheda, Osman S. Unsal, Israel Koren, C. M...
MM
2004
ACM
106views Multimedia» more  MM 2004»
14 years 3 months ago
Probabilistic delay guarantees using delay distribution measurement
Carriers increasingly differentiate their wide-area connectivity offerings by means of customized services, such as virtual private networks (VPN) with Quality of Service (QoS) g...
Kartik Gopalan, Tzi-cker Chiueh, Yow-Jian Lin
MM
2004
ACM
112views Multimedia» more  MM 2004»
14 years 3 months ago
LyricAlly: automatic synchronization of acoustic musical signals and textual lyrics
We present a prototype that automatically aligns acoustic musical signals with their corresponding textual lyrics, in a manner similar to manually-aligned karaoke. We tackle this ...
Ye Wang, Min-Yen Kan, Tin Lay Nwe, Arun Shenoy, Ju...