Sciweavers

1448 search results - page 95 / 290
» Restricted Stack Implementations
Sort
View
ICCCN
2007
IEEE
14 years 2 months ago
A Performance Evaluation of Vertical Handoff Scheme between Mobile-WiMax and Cellular Networks
- In multi-access network environments, interworking technologies has become a very important issue these days. This interworking would deliver optimized services to users and also...
SeongSoo Park, Jaehwang Yu, JongTae Ihm
IPPS
2006
IEEE
14 years 1 months ago
Towards MPI progression layer elimination with TCP and SCTP
MPI middleware glues together the components necessary for execution. Almost all implementations have a communication component also called a message progression layer that progre...
Brad Penoff, Alan Wagner
PLDI
2006
ACM
14 years 1 months ago
A microkernel virtual machine: : building security with clear interfaces
In this paper we propose a novel microkernel-based virtual machine (µKVM), a new code-based security framework with a simple and declarative security architecture. The main desig...
Xiaoqi Lu, Scott F. Smith
CVPR
2008
IEEE
14 years 1 months ago
General Constraints for Batch Multiple-Target Tracking Applied to Large-Scale Videomicroscopy
While there is a large class of Multiple-Target Tracking (MTT) problems for which batch processing is possible and desirable, batch MTT remains relatively unexplored in comparis...
Kevin Smith, Alan Carleton, Vincent Lepetit
ACSAC
2005
IEEE
14 years 1 months ago
A Framework for Detecting Network-based Code Injection Attacks Targeting Windows and UNIX
Code injection vulnerabilities continue to prevail. Attacks of this kind such as stack buffer overflows and heap buffer overflows account for roughly half of the vulnerabilities...
Stig Andersson, Andrew Clark, George M. Mohay, Bra...