Sciweavers

5600 search results - page 1097 / 1120
» Synthesizing robust systems
Sort
View
CCS
2009
ACM
13 years 11 months ago
Filter-resistant code injection on ARM
Code injections attacks are one of the most powerful and important classes of attacks on software. In such attacks, the attacker sends malicious input to a software application, w...
Yves Younan, Pieter Philippaerts, Frank Piessens, ...
DRR
2010
13 years 10 months ago
Biomedical article retrieval using multimodal features and image annotations in region-based CBIR
Biomedical images are invaluable in establishing diagnosis, acquiring technical skills, and implementing best practices in many areas of medicine. At present, images needed for in...
Daekeun You, Sameer Antani, Dina Demner-Fushman, M...
SGP
2007
13 years 10 months ago
Focal surfaces of discrete geometry
The differential geometry of smooth three-dimensional surfaces can be interpreted from one of two perspectives: in terms of oriented frames located on the surface, or in terms of ...
Jingyi Yu, Xiaotian Yin, Xianfeng Gu, Leonard McMi...
AIPS
2008
13 years 10 months ago
Fast Dynamic Scheduling of Disjunctive Temporal Constraint Networks through Incremental Compilation
Autonomous systems operating in real-world environments must plan, schedule, and execute missions while robustly adapting to uncertainty and disturbance. One way to mitigate the e...
Julie A. Shah, Brian C. Williams
NSDI
2007
13 years 10 months ago
Tesseract: A 4D Network Control Plane
We present Tesseract, an experimental system that enables the direct control of a computer network that is under a single administrative domain. Tesseract’s design is based on t...
Hong Yan, David A. Maltz, T. S. Eugene Ng, Hemant ...
« Prev « First page 1097 / 1120 Last » Next »