Sciweavers

1227 search results - page 145 / 246
» Remote Store Programming
Sort
View
CCS
2007
ACM
14 years 2 months ago
Analyzing network traffic to detect self-decrypting exploit code
Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are...
Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Pu...
ISSTA
2010
ACM
14 years 2 months ago
Automatic detection of unsafe component loadings
Dynamic loading of software components (e.g., libraries or modules) is a widely used mechanism for improved system modularity and flexibility. Correct component resolution is cri...
Taeho Kwon, Zhendong Su
BIOCOMP
2006
13 years 11 months ago
Membrane Remodeling and Diffusion of Cytochrome C from a Geometrically Idealized Mitochondrial Crista
In healthy eukaryotic cells, mitochondria have an outer membrane that surrounds a complex inner membrane structure [7,8]. Cytochrome c is found in the space between the two membra...
John Manor, Peter Salamon, James Nulton, Joseph Ma...
CIC
2006
13 years 11 months ago
IIOP Failover in Dynamic Clusters
Abstract-Requirement: Clients should experience high-availability when accessing network services. Availability should be transparent and not require altering programs. Problem: Av...
Harold Carr, Ken Cavanaugh
INTERACT
2003
13 years 11 months ago
Error Resolution Strategies for Interactive Television Speech Interfaces
: Using speech input to augment the remote control can be an alternative interaction technique for interactive television. However, little is known about how to design such a syste...
Aseel Berglund, Pernilla Qvarfordt