Sciweavers

1511 search results - page 215 / 303
» On the effectiveness of address-space randomization
Sort
View
P2P
2005
IEEE
119views Communications» more  P2P 2005»
14 years 1 months ago
Search with Probabilistic Guarantees in Unstructured Peer-to-Peer Networks
Search is a fundamental service in peer-to-peer (P2P) networks. However, despite numerous research efforts, efficient algorithms for guaranteed location of shared content in unst...
Ronaldo A. Ferreira, Murali Krishna Ramanathan, As...
SMI
2005
IEEE
14 years 1 months ago
Stochastic Microgeometry for Displacement Mapping
Creating surfaces with intricate small-scale features (microgeometry) and detail is an important task in geometric modeling and computer graphics. We present a model processing me...
Craig A. Schroeder, David E. Breen, Christopher D....
VTS
2005
IEEE
96views Hardware» more  VTS 2005»
14 years 1 months ago
Pseudo-Functional Scan-based BIST for Delay Fault
This paper presents a pseudo-functional BIST scheme that attempts to minimize the over-testing problem of logic BIST for delay and crosstalk-induced failures. The over-testing pro...
Yung-Chieh Lin, Feng Lu, Kwang-Ting Cheng
HIPC
2005
Springer
14 years 1 months ago
Orthogonal Decision Trees for Resource-Constrained Physiological Data Stream Monitoring Using Mobile Devices
Several challenging new applications demand the ability to do data mining on resource constrained devices. One such application is that of monitoring physiological data streams ob...
Haimonti Dutta, Hillol Kargupta, Anupam Joshi
IPTPS
2005
Springer
14 years 1 months ago
A First Look at Peer-to-Peer Worms: Threats and Defenses
Abstract— Peer-to-peer (P2P) worms exploit common vulnerabilities in member hosts of a P2P network and spread topologically in the P2P network, a potentially more effective strat...
Lidong Zhou, Lintao Zhang, Frank McSherry, Nicole ...