Sciweavers

122 search results - page 25 / 25
» Next Generation System Software for Future High-End Computin...
Sort
View
CCS
2005
ACM
13 years 10 months ago
Automatic diagnosis and response to memory corruption vulnerabilities
Cyber attacks against networked computers have become relentless in recent years. The most common attack method is to exploit memory corruption vulnerabilities such as buffer ove...
Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Chris...
IV
2003
IEEE
200views Visualization» more  IV 2003»
13 years 10 months ago
Artist As Researcher, Understanding The Tools
The paper begins with a response to the nature of contemporary artists relationships to how computers have permeated the fine art domain and how they affect the creative process. ...
Theresa Gartland-Jones