Sciweavers

451 search results - page 84 / 91
» A Distributed Digital Text Accessing and Acquisition System
Sort
View
ASPLOS
2006
ACM
15 years 5 months ago
Architectural support for software-based protection
Control-Flow Integrity (CFI) is a property that guarantees program control flow cannot be subverted by a malicious adversary, even if the adversary has complete control of data m...
Mihai Budiu, Úlfar Erlingsson, Martí...
100
Voted
CASES
2006
ACM
15 years 5 months ago
Adapting compilation techniques to enhance the packing of instructions into registers
The architectural design of embedded systems is becoming increasingly idiosyncratic to meet varying constraints regarding energy consumption, code size, and execution time. Tradit...
Stephen Hines, David B. Whalley, Gary S. Tyson
CCS
2009
ACM
15 years 4 months ago
TruWallet: trustworthy and migratable wallet-based web authentication
Identity theft has fostered to a major security problem on the Internet, in particular stealing passwords for web applications through phishing and malware. We present TruWallet, ...
Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadegh...
SEC
2003
15 years 1 months ago
Providing Voice Privacy Over Public Switched Telephone Networks
: The public telephone network has been evolving from manually switched wires carrying analog encoded voice of the 19th century to an automatically switched grid of copper-wired, f...
Mohamed Sharif, Duminda Wijesekera
CIKM
2010
Springer
14 years 10 months ago
CiteData: a new multi-faceted dataset for evaluating personalized search performance
Personalized search systems have evolved to utilize heterogeneous features including document hyperlinks, category labels in various taxonomies and social tags in addition to free...
Abhay Harpale, Yiming Yang, Siddharth Gopal, Daqin...