Sciweavers

4390 search results - page 821 / 878
» Part Objects and their Location
Sort
View
USS
2004
13 years 11 months ago
TIED, LibsafePlus: Tools for Runtime Buffer Overflow Protection
Buffer overflow exploits make use of the treatment of strings in C as character arrays rather than as first-class objects. Manipulation of arrays as pointers and primitive pointer...
Kumar Avijit, Prateek Gupta, Deepak Gupta
CASCON
1992
127views Education» more  CASCON 1992»
13 years 11 months ago
Overview of multidatabase transaction management
A multidatabase system (MDBS) is a facility that allows users access to data located in multiple autonomous database management systems (DBMSs). In such a system, globaltransaction...
Yuri Breitbart, Hector Garcia-Molina, Abraham Silb...
WALCOM
2007
IEEE
151views Algorithms» more  WALCOM 2007»
13 years 11 months ago
Base Station Placement Problem on the Boundary of a Convex Region
Due to the recent growth in the demand of mobile communication services in several typical environments, the development of efficient systems for providing specialized services ha...
Gautam K. Das, Sasanka Roy, Sandip Das, Subhas C. ...
ASSETS
2008
ACM
13 years 11 months ago
Slide rule: making mobile touch screens accessible to blind people using multi-touch interaction techniques
Recent advances in touch screen technology have increased the prevalence of touch screens and have prompted a wave of new touch screen-based devices. However, touch screens are st...
Shaun K. Kane, Jeffrey P. Bigham, Jacob O. Wobbroc...
COMAD
2009
13 years 11 months ago
A Feasibility Study on Automating the Automotive Insurance Claims Processing
In this paper, we present a feasibility study in automating the insurance claims processing system related to automotive sector. In automobile insurance claims processing, usually...
Jayanta Basak, Desmond Lim