Sciweavers

1016 search results - page 111 / 204
» Automatic Analysis of Programming Assignments
Sort
View
OSDI
2006
ACM
16 years 3 months ago
Securing Software by Enforcing Data-flow Integrity
Software attacks often subvert the intended data-flow in a vulnerable program. For example, attackers exploit buffer overflows and format string vulnerabilities to write data to u...
Manuel Costa, Miguel Castro, Timothy L. Harris
148
Voted
DAC
2007
ACM
16 years 4 months ago
Period Optimization for Hard Real-time Distributed Automotive Systems
The complexity and physical distribution of modern active-safety automotive applications requires the use of distributed architectures. These architectures consist of multiple ele...
Abhijit Davare, Qi Zhu, Marco Di Natale, Claudio P...
CIKM
2007
Springer
15 years 9 months ago
Developing learning strategies for topic-based summarization
Most up-to-date well-behaved topic-based summarization systems are built upon the extractive framework. They score the sentences based on the associated features by manually assig...
Ouyang You, Sujian Li, Wenjie Li
127
Voted
P2P
2006
IEEE
135views Communications» more  P2P 2006»
15 years 9 months ago
Ordered Slicing of Very Large-Scale Overlay Networks
Recently there has been an increasing interest to harness the potential of P2P technology to design and build rich environments where services are provided and multiple applicatio...
Márk Jelasity, Anne-Marie Kermarrec
SMA
2009
ACM
141views Solid Modeling» more  SMA 2009»
15 years 8 months ago
Robust principal curvatures using feature adapted integral invariants
Principal curvatures and principal directions are fundamental local geometric properties. They are well defined on smooth surfaces. However, due to the nature as higher order diļ...
Yu-Kun Lai, Shi-Min Hu, Tong Fang