Sciweavers

1548 search results - page 270 / 310
» Estimating Software Vulnerabilities
Sort
View
ISSS
2002
IEEE
125views Hardware» more  ISSS 2002»
15 years 4 months ago
Design Experience of a Chip Multiprocessor Merlot and Expectation to Functional Verification
We have fabricated a Chip Multiprocessor prototype code-named Merlot to proof our novel speculative multithreading architecture. On Merlot, multiple threads provide wider issue wi...
Satoshi Matsushita
C5
2009
IEEE
15 years 3 months ago
The PresenceDetector: Context Awareness for Collaboration
In this paper we introduce a concept of how the status of project partners in a virtual collaboration environment can be transferred in a subtle manner to gain useful information ...
Moritz Kemper, Constanze Langer, Christine Strotho...
GECCO
2009
Springer
110views Optimization» more  GECCO 2009»
15 years 3 months ago
EMO shines a light on the holes of complexity space
Typical domains used in machine learning analyses only partially cover the complexity space, remaining a large proportion of problem difficulties that are not tested. Since the ac...
Núria Macià, Albert Orriols-Puig, Es...
RAID
2001
Springer
15 years 3 months ago
Accurately Detecting Source Code of Attacks That Increase Privilege
Host-based Intrusion Detection Systems (IDS) that rely on audit data exhibit a delay between attack execution and attack detection. A knowledgeable attacker can use this delay to d...
Robert K. Cunningham, Craig S. Stevenson
CAMP
2000
IEEE
15 years 3 months ago
Homography Based Parallel Volume Intersection: Toward Real-Time Volume Reconstruction using Active Cameras
Silhouette volume intersection is one of the most popular ideas for reconstructing the 3D volume of an object from multi-viewpoint silhouette images. This paper presents a novel p...
Toshikazu Wada, Xiaojun Wu, Shogo Tokai, Takashi M...