Sciweavers

11739 search results - page 2335 / 2348
» Slideshow: functional presentations
Sort
View
ACSAC
2010
IEEE
13 years 6 months ago
Fast and practical instruction-set randomization for commodity systems
Instruction-set randomization (ISR) is a technique based on randomizing the "language" understood by a system to protect it from code-injection attacks. Such attacks wer...
Georgios Portokalidis, Angelos D. Keromytis
DOLAP
2010
ACM
13 years 6 months ago
Towards OLAP query reformulation in peer-to-peer data warehousing
Inter-business collaborative contexts prefigure a distributed scenario where companies organize and coordinate themselves to develop common and shared opportunities. Traditional b...
Matteo Golfarelli, Federica Mandreoli, Wilma Penzo...
ICIP
2010
IEEE
13 years 6 months ago
Barcode-based calibration of a 1-D blur restoration pipeline
: External Posting Date: October 21, 2010 [Fulltext] Approved for External Publication Internal Posting Date: October 21, 2010 [Fulltext] Barcode-Based Calibration of a 1-D Blur R...
Matthew Gaubatz, Steven J. Simske
ICISS
2010
Springer
13 years 6 months ago
ValueGuard: Protection of Native Applications against Data-Only Buffer Overflows
Abstract. Code injection attacks that target the control-data of an application have been prevalent amongst exploit writers for over 20 years. Today however, these attacks are gett...
Steven Van Acker, Nick Nikiforakis, Pieter Philipp...
IPPS
2010
IEEE
13 years 6 months ago
Improving numerical reproducibility and stability in large-scale numerical simulations on GPUs
The advent of general purpose graphics processing units (GPGPU's) brings about a whole new platform for running numerically intensive applications at high speeds. Their multi-...
Michela Taufer, Omar Padron, Philip Saponaro, Sand...
« Prev « First page 2335 / 2348 Last » Next »