Sciweavers

181 search results - page 22 / 37
» A Mechanism for Verifying Data Speculation
Sort
View
ICISS
2010
Springer
14 years 9 months ago
ValueGuard: Protection of Native Applications against Data-Only Buffer Overflows
Abstract. Code injection attacks that target the control-data of an application have been prevalent amongst exploit writers for over 20 years. Today however, these attacks are gett...
Steven Van Acker, Nick Nikiforakis, Pieter Philipp...
ICC
2007
IEEE
136views Communications» more  ICC 2007»
15 years 3 months ago
SAMcast - A Scalable, Secure and Authenticated Multicast Protocol for Large Scale P2P Networks
Overlay networks have shown tremendous potential in solving large scale data dissemination problem by employing peer-to-peer communication protocols. These networks, however, have ...
Waseem Ahmad, Ashfaq A. Khokhar
SSD
2009
Springer
167views Database» more  SSD 2009»
15 years 6 months ago
Continuous Spatial Authentication
Recent advances in wireless communications and positioning devices have generated a tremendous amount of interest in the continuous monitoring of spatial queries. However, such app...
Stavros Papadopoulos, Yin Yang, Spiridon Bakiras, ...
BPM
2006
Springer
128views Business» more  BPM 2006»
15 years 1 months ago
Towards Formal Verification of Web Service Composition
Abstract. Web services composition is an emerging paradigm for enabling application integration within and across organizational boundaries. Current Web services composition propos...
Mohsen Rouached, Olivier Perrin, Claude Godart
IPPS
2009
IEEE
15 years 6 months ago
Accelerating HMMer on FPGAs using systolic array based architecture
HMMer is a widely-used bioinformatics software package that uses profile HMMs (Hidden Markov Models) to model the primary structure consensus of a family of protein or nucleic aci...
Yanteng Sun, Peng Li, Guochang Gu, Yuan Wen, Yuan ...