Sciweavers

8881 search results - page 1722 / 1777
» Active Data Clustering
Sort
View
DAC
2007
ACM
15 years 10 months ago
A System For Coarse Grained Memory Protection In Tiny Embedded Processors
Many embedded systems contain resource constrained microcontrollers where applications, operating system components and device drivers reside within a single address space with no...
Ram Kumar, Akhilesh Singhania, Andrew Castner, Edd...
DAC
2007
ACM
15 years 10 months ago
Trusted Hardware: Can It Be Trustworthy?
Processing and storage of confidential or critical information is an every day occurrence in computing systems. The trustworthiness of computing devices has become an important co...
Cynthia E. Irvine, Karl N. Levitt
SIGSOFT
2004
ACM
15 years 10 months ago
Testing static analysis tools using exploitable buffer overflows from open source code
Five modern static analysis tools (ARCHER, BOON, PolySpace C Verifier, Splint, and UNO) were evaluated using source code examples containing 14 exploitable buffer overflow vulnera...
Misha Zitser, Richard Lippmann, Tim Leek
SIGSOFT
2003
ACM
15 years 10 months ago
Tracking pointers with path and context sensitivity for bug detection in C programs
This paper proposes a pointer alias analysis for automatic error detection. State-of-the-art pointer alias analyses are either too slow or too imprecise for finding errors in real...
V. Benjamin Livshits, Monica S. Lam
ISBI
2008
IEEE
15 years 10 months ago
Monte Carlo assessment of time-of-flight benefits on the LYSO-based discovery RX PET/CT scanner
Time-Of-Flight (TOF) positron emission tomography (PET) was studied and preliminarily developed in the 80s, but the lack of a scintillator able to deliver proper time resolution a...
Parham Geramifar, Mohammad Reza Ay, Mojtaba Shamsa...
« Prev « First page 1722 / 1777 Last » Next »