Sciweavers

15375 search results - page 334 / 3075
» cans 2008
Sort
View
IRI
2008
IEEE
15 years 11 months ago
Eliminating the threat of kernel stack overflows
The Linux kernel stack has a fixed size. There is no mechanism to prevent the kernel from overflowing the stack. Hackers can exploit this bug to put unwanted information in the me...
Yair Wiseman, Joel Isaacson, Eliad Lubovsky
ISCAS
2008
IEEE
104views Hardware» more  ISCAS 2008»
15 years 11 months ago
Reducing the effects of component mismatch by using relative size information
—This paper shows how the relative size of components can be used to increase matching performance – saving orders of magnitude in component area. The relative size information...
B. Robert Gregoire, Un-Ku Moon
ISMAR
2008
IEEE
15 years 11 months ago
ComposAR: An intuitive tool for authoring AR applications
This paper introduces ComposAR, a tool to allow a wide audience to author AR and MR applications. It is unique in that it supports both visual programming and interpretive scripti...
Hartmut Seichter, Julian Looser, Mark Billinghurst
KBSE
2008
IEEE
15 years 11 months ago
A Case Study on the Automatic Composition of Network Application Mashups
MaxMash is a tool that can compose select features of networked application and generate the source code for application mashups that can integrate those features. This paper pres...
Maxim Shevertalov, Spiros Mancoridis
KBSE
2008
IEEE
15 years 11 months ago
Semi-Automating Pragmatic Reuse Tasks
Developers undertaking a pragmatic reuse task must collect and reason about information that is spread throughout the source code of a system before they can understand the scope ...
Reid Holmes, Robert J. Walker