Sciweavers

12334 search results - page 168 / 2467
» The Use of C
Sort
View
ACSAC
2001
IEEE
15 years 8 months ago
Application Intrusion Detection using Language Library Calls
Traditionally, intrusion detection systems detect intrusions at the operating system (OS) level. In this paper we explore the possibility of detecting intrusion at the application...
Anita K. Jones, Yu Lin
139
Voted
SP
2002
IEEE
106views Security Privacy» more  SP 2002»
15 years 4 months ago
Using Programmer-Written Compiler Extensions to Catch Security Holes
This paper shows how system-speci c static analysis can nd security errors that violate rules such as \integers from untrusted sources must be sanitized before use" and \do n...
Ken Ashcraft, Dawson R. Engler
FIMH
2005
Springer
15 years 10 months ago
SPASM: Segmentation of Sparse and Arbitrarily Oriented Cardiac MRI Data Using a 3D-ASM
Abstract. In this paper, a new technique (SPASM) based on a 3DASM is presented for automatic segmentation of cardiac MRI image data sets consisting of multiple planes with differe...
Hans C. van Assen, Mikhail G. Danilouchkine, Aleja...
IEAAIE
2010
Springer
15 years 2 months ago
Using Remote Data Mining on LIDAR and Imagery Fusion Data to Develop Land Cover Maps
Remote sensing based on imagery has traditionally been the main tool used to extract land uses and land cover (LULC) maps. However, more powerful tools are needed in order to fulfi...
Jorge García-Gutiérrez, Francisco Ma...
PVM
1999
Springer
15 years 8 months ago
Building MPI for Multi-Programming Systems Using Implicit Information
Abstract. With the growing importance of fast system area networks in the parallel community, it is becoming common for message passing programs to run in multi-programming environ...
Frederick C. Wong, Andrea C. Arpaci-Dusseau, David...