Sciweavers

1508 search results - page 229 / 302
» Toward Software Plug-and-Play
Sort
View
122
Voted
CORR
2011
Springer
197views Education» more  CORR 2011»
14 years 7 months ago
Securing The Kernel via Static Binary Rewriting and Program Shepherding
Recent Microsoft security bulletins show that kernel vulnerabilities are becoming more and more important security threats. Despite the pretty extensive security mitigations many ...
Piotr Bania
159
Voted
CCR
2011
14 years 7 months ago
Dynamically scaling applications in the cloud
Scalability is said to be one of the major advantages brought by the cloud paradigm and, more specifically, the one that makes it different to an “advanced outsourcing” solu...
Luis M. Vaquero, Luis Rodero-Merino, Rajkumar Buyy...
145
Voted
DIMVA
2011
14 years 7 months ago
An Assessment of Overt Malicious Activity Manifest in Residential Networks
While conventional wisdom holds that residential users experience a high degree of compromise and infection, this presumption has seen little validation in the way of an in-depth s...
Gregor Maier, Anja Feldmann, Vern Paxson, Robin So...
146
Voted
ICDE
2011
IEEE
233views Database» more  ICDE 2011»
14 years 7 months ago
Schema evolution analysis for embedded databases
—Dynamic software updating research efforts have mostly been focused on updating application code and in-memory state. As more and more applications use embedded databases for st...
Shengfeng Wu, Iulian Neamtiu
697
Voted

Source Code
1378views
13 years 11 months ago
gradient vector flow
Active contours, or snakes, are computer-generated curves that move within images to find object boundaries. Its 3D version is often known as deformable models or active surfaces ...