Sciweavers

1114 search results - page 125 / 223
» Better Construction with Factories
Sort
View
DSN
2005
IEEE
15 years 3 months ago
Defeating Memory Corruption Attacks via Pointer Taintedness Detection
Most malicious attacks compromise system security through memory corruption exploits. Recently proposed techniques attempt to defeat these attacks by protecting program control da...
Shuo Chen, Jun Xu, Nithin Nakka, Zbigniew Kalbarcz...
ICAS
2005
IEEE
109views Robotics» more  ICAS 2005»
15 years 3 months ago
Proactive Route Maintenance and Overhead Reduction for Application Layer Multicast
— The purpose of this study is to maintain efficient backup routes for restoring overlay trees. In most conventional methods, after a node leaves the trees, its children start se...
Tetsuya Kusumoto, Yohei Kunichika, Jiro Katto, Sak...
ICIP
2005
IEEE
15 years 3 months ago
Content-based medical image retrieval using dynamically optimized regional features
This paper proposes a content-based medical image retrieval (CBMIR) framework using dynamically optimized features from multiple regions of medical images. These regional features...
Wei Xiong, Bo Qiu, Qi Tian, Changsheng Xu, Sim Hen...
ICITA
2005
IEEE
15 years 3 months ago
A Structured Peer-to-Peer Method to Discover QoS Enhanced Alternate Paths
In the next generation Internet, the network should not only be considered as a communication medium, but also as an endless source of services available to the end-systems. These...
Thierry Rakotoarivelo, Patrick Sénac, Aruna...
INFOCOM
2005
IEEE
15 years 3 months ago
Delayed-dictionary compression for packet networks
Abstract— This paper considers compression in packet networks. Since data packets may be dropped or arrive reordered, streaming compression algorithms result in a considerable de...
Yossi Matias, R. Refua