Sciweavers

1646 search results - page 223 / 330
» Validation Measures in CMMI
Sort
View
ACSAC
2005
IEEE
14 years 1 months ago
e-NeXSh: Achieving an Effectively Non-Executable Stack and Heap via System-Call Policing
We present e-NeXSh, a novel security approach that utilises kernel and LIBC support for efficiently defending systems against process-subversion attacks. Such attacks exploit vul...
Gaurav S. Kc, Angelos D. Keromytis
HICSS
2005
IEEE
143views Biometrics» more  HICSS 2005»
14 years 1 months ago
Evaluating PACS Success: A Multidimensional Model
A picture archiving and communications system (PACS) is an integrated workflow system for managing images and related data which is designed to streamline operations throughout th...
Guy Paré, David Aubry, Luigi Lepanto, Claud...
ICMCS
2005
IEEE
109views Multimedia» more  ICMCS 2005»
14 years 1 months ago
Ontology Design for Video Semantic Threads
We propose that, at the highest level of video understanding, the human needs for meaning and the methodologies to extract it are both universal and generic. One must develop an o...
John R. Kender, Milind R. Naphade
ICMCS
2005
IEEE
103views Multimedia» more  ICMCS 2005»
14 years 1 months ago
User Study for Generating Personalized Summary Profiles
The need for personalized summaries of media content has been driven by the recent and anticipated explosive growth in the media world. In this paper we present a methodology and ...
Lalitha Agnihotri, John R. Kender, Nevenka Dimitro...
ICNP
2005
IEEE
14 years 1 months ago
Can coexisting overlays inadvertently step on each other?
By allowing end hosts to make routing decisions at the application level, different overlay networks may unintentionally interfere with each other. This paper describes how multip...
Ram Keralapura, Chen-Nee Chuah, Nina Taft, Gianluc...