Combining ideas from several previous proposals, such as Active Pages, DIVA, and ULMT, we present the Memory Arithmetic Unit and Interface (MAUI) architecture. Because the “inte...
Justin Teller, Charles B. Silio Jr., Bruce L. Jaco...
Many software attacks are based on injecting malicious code into a target host. This paper demonstrates the use of a wellknown technique, data tainting, to track data received fro...
Alex Ho, Michael A. Fetterman, Christopher Clark, ...
Online social networks are enjoying drastic increase in their population and connectivity. One of the fundamental issues in these networks is trust, which is an essential factor in...
We present the KPC-Toolbox, a collection of Matlab scripts for fitting workload traces into Markovian Arrival Processes (MAPs) in an automatic way. We first present detailed sen...
We present experimental analysis to exploit the sequence dependence on energy saving in error tolerant image processing. Our analysis shows that the error distributions depend not...