Sciweavers

796 search results - page 16 / 160
» Spoofing prevention method
Sort
View
DAC
1993
ACM
14 years 1 months ago
A Negative Reinforcement Method for PGA Routing
We present an efficient and effective method for the detailed routing of symmetrical or sea-of-gates FPGA architectures. Instead of breaking the problem into 2-terminal net collec...
Forbes D. Lewis, Wang Chia-Chi Pong
BILDMED
2004
204views Algorithms» more  BILDMED 2004»
13 years 11 months ago
Topologically Correct Extraction of the Cortical Surface of a Brain Using Level-Set Methods
In this paper we present a level-set framework for accurate and efficient extraction of the surface of a brain from MRI data. To prevent the so-called partial volume effect we use ...
Stephan Bischoff, Leif Kobbelt
CORR
2010
Springer
135views Education» more  CORR 2010»
13 years 10 months ago
JIT Spraying and Mitigations
With the discovery of new exploit techniques, novel protection mechanisms are needed as well. Mitigations like DEP (Data Execution Prevention) or ASLR (Address Space Layout Random...
Piotr Bania
IJAIT
2007
180views more  IJAIT 2007»
13 years 9 months ago
Detection and Prediction of Rare Events in Transaction Databases
Rare events analysis is an area that includes methods for the detection and prediction of events, e.g. a network intrusion or an engine failure, that occur infrequently and have s...
Christos Berberidis, Ioannis P. Vlahavas
TVCG
2008
135views more  TVCG 2008»
13 years 9 months ago
A Fast and Stable Penalty Method for Rigid Body Simulation
Two methods have been used extensively to model resting contact for rigid body simulation. The first approach, the penalty method, applies virtual springs to surfaces in contact to...
Evan Drumwright