Sciweavers

1485 search results - page 55 / 297
» Whole Program Paths
Sort
View
DSN
2007
IEEE
14 years 1 months ago
Augmenting Branch Predictor to Secure Program Execution
Although there are various ways to exploit software vulnerabilities for malicious attacks, the attacks always result in unexpected behavior in program execution, deviating from wh...
Yixin Shi, Gyungho Lee
IJCGA
2010
86views more  IJCGA 2010»
13 years 8 months ago
Leaving an Unknown Maze Using an Error-Prone Compass
Imagine you are trapped in a maze of caves. All you have is an old rusty compass and barely enough light to read it. How much inaccuracy can you allow to ensure that you can leave...
Tom Kamphans, Elmar Langetepe
OPODIS
2008
13 years 11 months ago
Revising Distributed UNITY Programs Is NP-Complete
We focus on automated revision techniques for adding Unity properties to distributed programs. We show that unlike centralized programs, where multiple safety properties along with...
Borzoo Bonakdarpour, Sandeep S. Kulkarni
SOFSEM
2005
Springer
14 years 3 months ago
Anonymous Communication with On-line and Off-line Onion Encoding
Abstract. Anonymous communication with onions requires that a user application determines the whole routing path of an onion. This scenario has certain disadvantages, it might be d...
Marek Klonowski, Miroslaw Kutylowski, Filip Zag&oa...
NIPS
2003
13 years 11 months ago
1-norm Support Vector Machines
The standard 2-norm SVM is known for its good performance in twoclass classi£cation. In this paper, we consider the 1-norm SVM. We argue that the 1-norm SVM may have some advanta...
Ji Zhu, Saharon Rosset, Trevor Hastie, Robert Tibs...