Sciweavers

12052 search results - page 2337 / 2411
» computing 2010
Sort
View
SP
2010
IEEE
174views Security Privacy» more  SP 2010»
14 years 1 months ago
HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity
— Virtualization is being widely adopted in today’s computing systems. Its unique security advantages in isolating and introspecting commodity OSes as virtual machines (VMs) ha...
Zhi Wang, Xuxian Jiang
SP
2010
IEEE
158views Security Privacy» more  SP 2010»
14 years 1 months ago
Tamper Evident Microprocessors
Abstract—Most security mechanisms proposed to date unquestioningly place trust in microprocessor hardware. This trust, however, is misplaced and dangerous because microprocessors...
Adam Waksman, Simha Sethumadhavan
CAV
2010
Springer
225views Hardware» more  CAV 2010»
14 years 1 months ago
Merit: An Interpolating Model-Checker
Abstract. We present the tool MERIT, a CEGAR model-checker for safety propf counter-systems, which sits in the Lazy Abstraction with Interpolants (LAWI) framework. LAWI is parametr...
Nicolas Caniart
DAS
2010
Springer
14 years 1 months ago
Text extraction from graphical document images using sparse representation
A novel text extraction method from graphical document images is presented in this paper. Graphical document images containing text and graphics components are considered as two-d...
Thai V. Hoang, Salvatore Tabbone
ICDT
2010
ACM
161views Database» more  ICDT 2010»
14 years 1 months ago
Data Correspondence, Exchange, and Repair
Checking the correspondence between two or more database instances and enforcing it is a procedure widely used in practice without however having been explored from a theoretical ...
Gösta Grahne, Adrian Onet
« Prev « First page 2337 / 2411 Last » Next »