Sciweavers

96 search results - page 17 / 20
» Exploiting and Protecting Dynamic Code Generation
Sort
View
87
Voted
IJSSE
2010
80views more  IJSSE 2010»
14 years 7 months ago
Improving Memory Management Security for C and C++
Memory managers are an important part of any modern language: they are used to dynamically allocate memory for use in the program. Many managers exist and depending on the operati...
Yves Younan, Wouter Joosen, Frank Piessens, Hans V...
VTC
2010
IEEE
113views Communications» more  VTC 2010»
14 years 8 months ago
Multi-Level Turbo Decoding Assisted Soft Combining Aided Hybrid ARQ
—1 Hybrid Automatic Repeat reQuest (ARQ) plays an essential role in error control. Combining the incorrectly received packet replicas in hybrid ARQ has been shown to reduce the r...
Hong Chen, Robert G. Maunder, Lajos Hanzo
105
Voted
ICS
2009
Tsinghua U.
14 years 8 months ago
R-ADMAD: high reliability provision for large-scale de-duplication archival storage systems
Data de-duplication has become a commodity component in dataintensive systems and it is required that these systems provide high reliability comparable to others. Unfortunately, b...
Chuanyi Liu, Yu Gu, Linchun Sun, Bin Yan, Dongshen...
ICFP
2005
ACM
15 years 10 months ago
Acute: high-level programming language design for distributed computation
Existing languages provide good support for typeful programming of standalone programs. In a distributed system, however, there may be interaction between multiple instances of ma...
Peter Sewell, James J. Leifer, Keith Wansbrough, F...
102
Voted
DSN
2007
IEEE
15 years 2 months ago
Augmenting Branch Predictor to Secure Program Execution
Although there are various ways to exploit software vulnerabilities for malicious attacks, the attacks always result in unexpected behavior in program execution, deviating from wh...
Yixin Shi, Gyungho Lee