Sciweavers

4719 search results - page 106 / 944
» Applications = Components GLoo
Sort
View
93
Voted
COMPSAC
2005
IEEE
15 years 9 months ago
Buffer Overrun Prevention Through Component Composition Analysis
Buffer overrun vulnerabilities cause significant security problems, and have proven to be difficult to prevent. In this paper we present a novel approach to tackling the problem...
David Llewellyn-Jones, Madjid Merabti, Qi Shi, Bob...
CBSE
2005
Springer
15 years 9 months ago
Real-Time Scheduling Techniques for Implementation Synthesis from Component-Based Software Models
We consider a class of component-based software models with interaction style of buffered asynchronous message passing between components with ports, represented by UML-RT. After ...
Zonghua Gu, Zhimin He
110
Voted
SPW
2004
Springer
15 years 8 months ago
Authentication Components: Engineering Experiences and Guidelines
abstract February 6, 2004 Security protocols typically employ an authentication phase followed by a protected data exchange. In some cases, such TLS, these two phases are tightly ...
Pasi Eronen, Jari Arkko
111
Voted
ICASSP
2009
IEEE
15 years 7 months ago
Principal component analysis in decomposable Gaussian graphical models
We consider principal component analysis (PCA) in decomposable Gaussian graphical models. We exploit the prior information in these models in order to distribute its computation. ...
Ami Wiesel, Alfred O. Hero III
130
Voted
DAS
2006
Springer
15 years 7 months ago
Bangla/English Script Identification Based on Analysis of Connected Component Profiles
Script identification is required for a multilingual OCR system. In this paper, we present a novel and efficient technique for Bangla/English script identification with application...
Lijun Zhou, Yue Lu, Chew Lim Tan