Sciweavers

2957 search results - page 253 / 592
» Code analysis and CS-XML
Sort
View
106
Voted
ACSAC
2006
IEEE
15 years 9 months ago
Vulnerability Analysis of MMS User Agents
The Multimedia Messaging Service (MMS) is becoming more popular, as mobile phones integrate audio and video recording functionality. Multimedia messages are delivered to users thr...
Collin Mulliner, Giovanni Vigna
126
Voted
WOWMOM
2006
ACM
94views Multimedia» more  WOWMOM 2006»
15 years 9 months ago
Performance Analysis and Enhancement of the Next Generation Cellular Networks
— As more and more wireless subscribers access the Internet through cellular networks, Internet data traffic, which is known to be long range dependent (LRD), will soon dominate...
Xiang Yu, Chunming Qiao, Xin Wang, Dahai Xu
133
Voted
MICRO
2005
IEEE
123views Hardware» more  MICRO 2005»
15 years 9 months ago
A Criticality Analysis of Clustering in Superscalar Processors
Clustered machines partition hardware resources to circumvent the cycle time penalties incurred by large, monolithic structures. This partitioning introduces a long inter-cluster ...
Pierre Salverda, Craig B. Zilles
125
Voted
CASSIS
2005
Springer
15 years 9 months ago
Information Flow Analysis for a Typed Assembly Language with Polymorphic Stacks
Abstract. We study secure information flow in a stack based Typed Assembly Language (TAL). We define a TAL with an execution stack and establish the soundness of its type system ...
Eduardo Bonelli, Adriana B. Compagnoni, Ricardo Me...
IWINAC
2005
Springer
15 years 9 months ago
Separation of Extracellular Spikes: When Wavelet Based Methods Outperform the Principle Component Analysis
spike separation is a basic prerequisite for analyzing of the cooperative neural behavior and neural code when registering extracelluIarly. Final performance of any spike sorting m...
Alexey N. Pavlov, Valeri A. Makarov, Ioulia Makaro...