Sciweavers

4280 search results - page 777 / 856
» Mechanisms for information elicitation
Sort
View
ICISS
2010
Springer
13 years 8 months ago
ValueGuard: Protection of Native Applications against Data-Only Buffer Overflows
Abstract. Code injection attacks that target the control-data of an application have been prevalent amongst exploit writers for over 20 years. Today however, these attacks are gett...
Steven Van Acker, Nick Nikiforakis, Pieter Philipp...
CSCW
2011
ACM
13 years 5 months ago
Your time zone or mine?: a study of globally time zone-shifted collaboration
We conducted interviews with sixteen members of teams that worked across global time zone differences. Despite time zone differences of about eight hours, collaborators still foun...
John C. Tang, Chen Zhao, Xiang Cao, Kori Inkpen
NAR
2011
227views Computer Vision» more  NAR 2011»
13 years 5 months ago
VnD: a structure-centric database of disease-related SNPs and drugs
Numerous genetic variations have been found to be related to human diseases. Significant portion of those affect the drug response as well by changing the protein structure and fu...
Jin Ok Yang, Sangho Oh, Gunhwan Ko, Seong-Jin Park...
SIGOPS
2011
215views Hardware» more  SIGOPS 2011»
13 years 5 months ago
Log-based architectures: using multicore to help software behave correctly
While application performance and power-efficiency are both important, application correctness is even more important. In other words, if the application is misbehaving, it is li...
Shimin Chen, Phillip B. Gibbons, Michael Kozuch, T...
TON
2010
204views more  TON 2010»
13 years 4 months ago
Passive Diagnosis for Wireless Sensor Networks
Network diagnosis, an essential research topic for traditional networking systems, has not received much attention for wireless sensor networks. Existing sensor debugging tools li...
Yunhao Liu, Kebin Liu, Mo Li