Sciweavers

1477 search results - page 202 / 296
» Random Convex Programs
Sort
View
116
Voted
ESOP
2009
Springer
15 years 9 months ago
All Secrets Great and Small
Tools for analysing secure information flow are almost exclusively based on ideas going back to Denning’s work from the 70’s. This approach embodies an imperfect notion of sec...
Delphine Demange, David Sands
137
Voted
ASPLOS
2008
ACM
15 years 4 months ago
Archipelago: trading address space for reliability and security
Memory errors are a notorious source of security vulnerabilities that can lead to service interruptions, information leakage and unauthorized access. Because such errors are also ...
Vitaliy B. Lvin, Gene Novark, Emery D. Berger, Ben...
147
Voted
JUCS
2006
123views more  JUCS 2006»
15 years 2 months ago
Persian/Arabic Baffletext CAPTCHA
: Nowadays, many daily human activities such as education, trade, talks, etc are done by using the Internet. In such things as registration on Internet web sites, hackers write pro...
Mohammad Hassan Shirali-Shahreza, Mohammad Shirali...
116
Voted
CACM
2008
131views more  CACM 2008»
15 years 2 months ago
Exterminator: Automatically correcting memory errors with high probability
Programs written in C and C++ are susceptible to memory errors, including buffer overflows and dangling pointers. These errors, which can lead to crashes, erroneous execution, and...
Gene Novark, Emery D. Berger, Benjamin G. Zorn
132
Voted
ICCV
2007
IEEE
16 years 4 months ago
Learning 3-D Scene Structure from a Single Still Image
We consider the problem of estimating detailed 3-d structure from a single still image of an unstructured environment. Our goal is to create 3-d models which are both quantitative...
Ashutosh Saxena, Min Sun, Andrew Y. Ng