Sciweavers

209 search results - page 38 / 42
» Evaluating the performance of user-space and kernel-space we...
Sort
View
ACSAC
2010
IEEE
14 years 7 months ago
Fast and practical instruction-set randomization for commodity systems
Instruction-set randomization (ISR) is a technique based on randomizing the "language" understood by a system to protect it from code-injection attacks. Such attacks wer...
Georgios Portokalidis, Angelos D. Keromytis
EUROSYS
2008
ACM
15 years 6 months ago
Samurai: protecting critical data in unsafe languages
Programs written in type-unsafe languages such as C and C++ incur costly memory errors that result in corrupted data structures, program crashes, and incorrect results. We present...
Karthik Pattabiraman, Vinod Grover, Benjamin G. Zo...
ISW
2005
Springer
15 years 3 months ago
gore: Routing-Assisted Defense Against DDoS Attacks
Abstract. We present gore, a routing-assisted defense architecture against distributed denial of service (DDoS) attacks that provides guaranteed levels of access to a network under...
Stephen T. Chou, Angelos Stavrou, John Ioannidis, ...
78
Voted
WCW
2004
Springer
15 years 2 months ago
An Empirical Study of a Segment-Based Streaming Proxy in an Enterprise Environment
Abstract. Streaming media workloads have a number of desirable properties that make them good candidates for caching via proxy systems. The content does not get modified, and acce...
Sumit Roy, Bo Shen, Songqing Chen, Xiaodong Zhang
BMCBI
2010
153views more  BMCBI 2010»
14 years 9 months ago
GOAL: A software tool for assessing biological significance of genes groups
Background: Modern high throughput experimental techniques such as DNA microarrays often result in large lists of genes. Computational biology tools such as clustering are then us...
Alain B. Tchagang, Alexander Gawronski, Hugo B&eac...