Sciweavers

1511 search results - page 227 / 303
» On the effectiveness of address-space randomization
Sort
View
NSDI
2007
13 years 10 months ago
Ensuring Content Integrity for Untrusted Peer-to-Peer Content Distribution Networks
Many existing peer-to-peer content distribution networks (CDNs) such as Na Kika, CoralCDN, and CoDeeN are deployed on PlanetLab, a relatively trusted environment. But scaling them...
Nikolaos Michalakis, Robert Soulé, Robert G...
AIPR
2008
IEEE
13 years 10 months ago
Full body tracking using an agent-based architecture
We present an agent-based full body tracking and 3D animation system to generate motion data using stereo calibrated cameras. The novelty of our approach is that agents are bound t...
Bing Fang, Liguang Xie, Pak-Kiu Chung, Yong Cao, F...
CCS
2008
ACM
13 years 9 months ago
Deconstructing new cache designs for thwarting software cache-based side channel attacks
Software cache-based side channel attacks present a serious threat to computer systems. Previously proposed countermeasures were either too costly for practical use or only effect...
Jingfei Kong, Onur Aciiçmez, Jean-Pierre Se...
CEAS
2008
Springer
13 years 9 months ago
Filtering Email Spam in the Presence of Noisy User Feedback
Recent email spam filtering evaluations, such as those conducted at TREC, have shown that near-perfect filtering results are attained with a variety of machine learning methods wh...
D. Sculley, Gordon V. Cormack
ISPEC
2010
Springer
13 years 9 months ago
Certificateless KEM and Hybrid Signcryption Schemes Revisited
Often authentication and confidentiality are required as simultaneous key requirements in many cryptographic applications. The cryptographic primitive called signcryption effective...
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Ra...