Sciweavers

1448 search results - page 102 / 290
» Restricted Stack Implementations
Sort
View
FORTE
1996
13 years 9 months ago
Combined Application of SDL-92, OMT, MSC and TTCN
The paper describes the application of SDL-92[1] and OMT[2] to the design of a V5.x Access Network interface. While OMT is used to model the management aspects of the system, typi...
Eurico Inocêncio, Manuel Ricardo, Hitoshi Sa...
CROSSROADS
2008
109views more  CROSSROADS 2008»
13 years 7 months ago
Exploring global terrorism data: a web-based visualization of temporal data
Recently, there has been a dramatic increase in both the amount of terrorism related literature and public interest towards the matter. Even so, it is difficult to gain access to ...
Joonghoon Lee
IJISEC
2006
106views more  IJISEC 2006»
13 years 7 months ago
Execution transactions for defending against software failures: use and evaluation
We examine the problem of containing buffer overflow attacks in a safe and efficient manner. Briefly, we automatically augment source code to dynamically catch stack and heap-based...
Stelios Sidiroglou, Angelos D. Keromytis
JEA
2006
90views more  JEA 2006»
13 years 7 months ago
Heuristics for estimating contact area of supports in layered manufacturing
Layered Manufacturing is a technology that allows physical prototypes of three-dimensional models to be built directly from their digital representation, as a stack of two-dimensi...
Ivaylo Ilinkin, Ravi Janardan, Michiel H. M. Smid,...
JSAC
2006
120views more  JSAC 2006»
13 years 7 months ago
A Tutorial on Cross-Layer Optimization in Wireless Networks
This tutorial paper overviews recent developments in optimization-based approaches for resource allocation problems in wireless systems. We begin by overviewing important results i...
Xiaojun Lin, Ness B. Shroff, R. Srikant