Sciweavers

472 search results - page 48 / 95
» Taking Topic Detection From Evaluation to Practice
Sort
View
INFOCOM
2007
IEEE
14 years 3 months ago
Neighborhood Watch for Internet Routing: Can We Improve the Robustness of Internet Routing Today?
— Protecting BGP routing from errors and malice is one of the next big challenges for Internet routing. Several approaches have been proposed that attempt to capture and block ro...
Georgos Siganos, Michalis Faloutsos
ACSAC
2010
IEEE
13 years 7 months ago
G-Free: defeating return-oriented programming through gadget-less binaries
Despite the numerous prevention and protection mechanisms that have been introduced into modern operating systems, the exploitation of memory corruption vulnerabilities still repr...
Kaan Onarlioglu, Leyla Bilge, Andrea Lanzi, Davide...
MICAI
2009
Springer
14 years 3 months ago
People Detection by a Mobile Robot Using Stereo Vision in Dynamic Indoor Environments
People detection and tracking is a key issue for social robot design and effective human robot interaction. This paper addresses the problem of detecting people with a mobile robo...
José Alberto Méndez-Polanco, Ang&eac...
MICRO
2010
IEEE
161views Hardware» more  MICRO 2010»
13 years 7 months ago
AtomTracker: A Comprehensive Approach to Atomic Region Inference and Violation Detection
A particularly insidious type of concurrency bug is atomicity violations. While there has been substantial work on automatic detection of atomicity violations, each existing techn...
Abdullah Muzahid, Norimasa Otsuki, Josep Torrellas
CCS
2006
ACM
14 years 23 days ago
Packet vaccine: black-box exploit detection and signature generation
In biology, a vaccine is a weakened strain of a virus or bacterium that is intentionally injected into the body for the purpose of stimulating antibody production. Inspired by thi...
XiaoFeng Wang, Zhuowei Li, Jun Xu, Michael K. Reit...