Sciweavers

550 search results - page 82 / 110
» A lightweight approach to state based security testing
Sort
View
PLDI
2009
ACM
15 years 10 months ago
SoftBound: highly compatible and complete spatial memory safety for c
The serious bugs and security vulnerabilities facilitated by C/C++'s lack of bounds checking are well known, yet C and C++ remain in widespread use. Unfortunately, C's a...
Santosh Nagarakatte, Jianzhou Zhao, Milo M. K. Mar...
CVPR
2004
IEEE
15 years 11 months ago
3D Human Pose from Silhouettes by Relevance Vector Regression
We describe a learning based method for recovering 3D human body pose from single images and monocular image sequences. Our approach requires neither an explicit body model nor pr...
Ankur Agarwal, Bill Triggs
81
Voted
WIOPT
2005
IEEE
15 years 3 months ago
An Interactive Transparent Protocol for Connection Oriented Mobility -- Performance Analysis with Voice Traffic
Loss-Free handoff in Mobile Networks is an extensive research area. Mobile IP (MIP) provided a solution to enable a mobile node to roam from one location to another while maintain...
Raid Zaghal, Sandeep Davu, Javed I. Khan
MATA
2004
Springer
149views Communications» more  MATA 2004»
15 years 3 months ago
Detecting and Proving Manipulation Attacks in Mobile Agent Systems
Mobile agents are software entities consisting of code, data and state that can migrate autonomously from host to host executing their code. Unfortunately, security issues restrict...
Oscar Esparza, Miguel Soriano, Jose L. Muño...
IEEEARES
2006
IEEE
15 years 3 months ago
Diagnosis of Complex Systems Using Ant Colony Decision Petri Nets
Failure diagnosis in large and complex systems is a critical task. A discrete event system (DES) approach to the problem of failure diagnosis is presented in this paper. A classic...
Calin Ciufudean, Adrian Graur, Constantin Filote, ...