Sciweavers

318 search results - page 45 / 64
» Using Memory Errors to Attack a Virtual Machine
Sort
View
SI3D
1999
ACM
14 years 29 days ago
MMR: an interactive massive model rendering system using geometric and image-based acceleration
We present a system for rendering very complex 3D models at interactive rates. We select a subset of the model as preferred viewpoints and partition the space into virtual cells. ...
Daniel G. Aliaga, Jonathan D. Cohen, Andrew Wilson...
SAC
2008
ACM
13 years 8 months ago
Crime scene classification
In this paper we provide a study about crime scenes and its features used in criminal investigations. We argue that the crime scene provides a large set of features that can be us...
Ricardo O. Abu Hana, Cinthia Obladen de Almendra F...
CCR
2002
112views more  CCR 2002»
13 years 8 months ago
New directions in traffic measurement and accounting
Accurate network traffic measurement is required for accounting, bandwidth provisioning and detecting DoS attacks. These applications see the traffic as a collection of flows they...
Cristian Estan, George Varghese
POPL
1998
ACM
14 years 27 days ago
A Type System for Java Bytecode Subroutines
Java is typically compiled into an intermediate language, JVML, that is interpreted by the Java Virtual Machine. Because mobile JVML code is not always trusted, a bytecode verifi...
Raymie Stata, Martín Abadi
USS
2010
13 years 6 months ago
Dude, Where's That IP? Circumventing Measurement-based IP Geolocation
Many applications of IP geolocation can benefit from geolocation that is robust to adversarial clients. These include applications that limit access to online content to a specifi...
Phillipa Gill, Yashar Ganjali, Bernard Wong, David...