Sciweavers

5863 search results - page 1035 / 1173
» An evaluation of the TRIPS computer system
Sort
View
ACSAC
2010
IEEE
14 years 12 months ago
Analyzing and improving Linux kernel memory protection: a model checking approach
Code injection continues to pose a serious threat to computer systems. Among existing solutions, W X is a notable approach to prevent the execution of injected code. In this paper...
Siarhei Liakh, Michael C. Grace, Xuxian Jiang
EMNLP
2010
14 years 12 months ago
Joint Inference for Bilingual Semantic Role Labeling
We show that jointly performing semantic role labeling (SRL) on bitext can improve SRL results on both sides. In our approach, we use monolingual SRL systems to produce argument c...
Tao Zhuang, Chengqing Zong
EVOW
2010
Springer
14 years 12 months ago
New Genetic Operators in the Fly Algorithm: Application to Medical PET Image Reconstruction
Abstract. This paper presents an evolutionary approach for image reconstruction in positron emission tomography (PET). Our reconstruction method is based on a cooperative coevoluti...
Franck Patrick Vidal, Jean Louchet, Jean-Marie Roc...
FGIT
2010
Springer
14 years 12 months ago
Improved Location Aided Cluster Based Routing Protocol for GPS Enabled Manets
Routing has been the main challenge for ad hoc networks due to dynamic topology as well as resource constraints. Completely GPS free as well as GPS scarce positioning systems for ...
S. Mangai, A. Tamilarasi
122
Voted
SIN
2010
ACM
14 years 11 months ago
A calculus for the qualitative risk assessment of policy override authorization
Policy override is gaining traction in the research community to improve the efficiency and usability of authorization mechanisms. These mechanisms turn the conventional privilege...
Steffen Bartsch
« Prev « First page 1035 / 1173 Last » Next »