Sciweavers

421 search results - page 82 / 85
» SCIDS: A Soft Computing Intrusion Detection System
Sort
View
HAPTICS
2006
IEEE
14 years 1 months ago
A Sensitive Skin Based on Touch-Area-Evaluating Tactile Elements
In this paper, we propose a new tactile sensor skin system. The system consists of two components. One is a sensor element which detects a contact area in addition to a contact fo...
Takayuki Hoshi, Hiroyuki Shinoda
CCS
2007
ACM
14 years 1 months ago
Memsherlock: an automated debugger for unknown memory corruption vulnerabilities
Software vulnerabilities have been the main contributing factor to the Internet security problems such as fast spreading worms. Among these software vulnerabilities, memory corrup...
Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu
TC
2010
13 years 6 months ago
PERFECTORY: A Fault-Tolerant Directory Memory Architecture
—The number of CPUs in chip multiprocessors is growing at the Moore’s Law rate, due to continued technology advances. However, new technologies pose serious reliability challen...
Hyunjin Lee, Sangyeun Cho, Bruce R. Childers
IPPS
2008
IEEE
14 years 2 months ago
High-speed string searching against large dictionaries on the Cell/B.E. Processor
Our digital universe is growing, creating exploding amounts of data which need to be searched, protected and filtered. String searching is at the core of the tools we use to curb...
Daniele Paolo Scarpazza, Oreste Villa, Fabrizio Pe...
CF
2004
ACM
14 years 1 months ago
Repairing return address stack for buffer overflow protection
Although many defense mechanisms against buffer overflow attacks have been proposed, buffer overflow vulnerability in software is still one of the most prevalent vulnerabilities e...
Yong-Joon Park, Gyungho Lee