Sciweavers

15 search results - page 1 / 3
» Comprehensively and efficiently protecting the heap
Sort
View
ASPLOS
2006
ACM
13 years 8 months ago
Comprehensively and efficiently protecting the heap
The goal of this paper is to propose a scheme that provides comprehensive security protection for the heap. Heap vulnerabilities are increasingly being exploited for attacks on co...
Mazen Kharbutli, Xiaowei Jiang, Yan Solihin, Guru ...
MSS
2007
IEEE
100views Hardware» more  MSS 2007»
13 years 11 months ago
Efficient Logging and Replication Techniques for Comprehensive Data Protection
Mariner is an iSCSI-based storage system that is de­ signed to provide comprehensive data protection on com­ modity ATA disk and Gigabit Ethernet technologies while offering the...
Maohua Lu, Shibiao Lin, Tzi-cker Chiueh
CONCURRENCY
2000
101views more  CONCURRENCY 2000»
13 years 4 months ago
Jaguar: enabling efficient communication and I/O in Java
Implementing efficient communication and I/O mechanisms in Java requires both fast access to lowlevel system resources (such as network and raw disk interfaces) and direct manipul...
Matt Welsh, David E. Culler
MOBIMEDIA
2007
13 years 6 months ago
Unequal error protection based on objective video evaluation model
Usually unequal error protection schemes mostly focus on protecting video data parameters with unequal rates or levels depending on their sensitivities to errors. This paper first...
Wen Ji, Yiqiang Chen, Min Chen, Yi Kang
ICIP
2008
IEEE
13 years 11 months ago
H.264/AVC video scrambling for privacy protection
In this paper, we address the problem of privacy in video surveillance systems. More specifically, we consider the case of H.264/AVC which is the state-of-the-art in video coding....
Frédéric Dufaux, Touradj Ebrahimi