Sciweavers

1560 search results - page 76 / 312
» Order Functions and Evaluation Codes
Sort
View
JALC
2006
125views more  JALC 2006»
13 years 10 months ago
A Confinement Criterion for Securely Executing Mobile Code
Mobile programs, like applets, are not only ubiquitous, but also potentially malicious. We study the case where mobile programs are executed by a host system in a secured environm...
Hervé Grall
CCS
2007
ACM
14 years 2 months ago
A framework for diversifying windows native APIs to tolerate code injection attacks
We present a framework to prevent code injection attacks in MS Windows using Native APIs in the operating system. By adopting the idea of diversity, this approach is implemented i...
Lynette Qu Nguyen, Tufan Demir, Jeff Rowe, Francis...
NAR
2000
85views more  NAR 2000»
13 years 9 months ago
MitoNuc and MitoAln: two related databases of nuclear genes coding for mitochondrial proteins
Mitochondria, besides their central role in energy metabolism, have recently been found to be involved in a number of basic processes of cell life and to contribute to the pathoge...
Graziano Pesole, Carmela Gissi, Domenico Catalano,...
CPC
2004
69views more  CPC 2004»
13 years 9 months ago
New Bounds on Parent-Identifying Codes: The Case of Multiple Parents
Let C be a code of length n over an alphabet of q letters. A codeword y is called a descendant of a set of t codewords {x1 , . . . , xt } if yi {x1 i , . . . , xt i} for all i = ...
Noga Alon, Uri Stav
ICIP
2003
IEEE
14 years 11 months ago
Video coding using a deformation compensation algorithm based on adaptive matching pursuit image decompositions
Today's video codecs employ motion compensated prediction in combination with block matching techniques. These techniques, although achieving some level of adaptivity in thei...
Òscar Divorra Escoda, Pierre Vandergheynst