Sciweavers

1508 search results - page 229 / 302
» Toward Software Plug-and-Play
Sort
View
CORR
2011
Springer
197views Education» more  CORR 2011»
13 years 29 days ago
Securing The Kernel via Static Binary Rewriting and Program Shepherding
Recent Microsoft security bulletins show that kernel vulnerabilities are becoming more and more important security threats. Despite the pretty extensive security mitigations many ...
Piotr Bania
CCR
2011
13 years 24 days ago
Dynamically scaling applications in the cloud
Scalability is said to be one of the major advantages brought by the cloud paradigm and, more specifically, the one that makes it different to an “advanced outsourcing” solu...
Luis M. Vaquero, Luis Rodero-Merino, Rajkumar Buyy...
DIMVA
2011
13 years 22 days ago
An Assessment of Overt Malicious Activity Manifest in Residential Networks
While conventional wisdom holds that residential users experience a high degree of compromise and infection, this presumption has seen little validation in the way of an in-depth s...
Gregor Maier, Anja Feldmann, Vern Paxson, Robin So...
ICDE
2011
IEEE
233views Database» more  ICDE 2011»
13 years 20 days ago
Schema evolution analysis for embedded databases
—Dynamic software updating research efforts have mostly been focused on updating application code and in-memory state. As more and more applications use embedded databases for st...
Shengfeng Wu, Iulian Neamtiu

Source Code
1378views
12 years 5 months ago
gradient vector flow
Active contours, or snakes, are computer-generated curves that move within images to find object boundaries. Its 3D version is often known as deformable models or active surfaces ...