Sciweavers

27827 search results - page 5193 / 5566
» Generating
Sort
View
145
Voted
ACSAC
2004
IEEE
15 years 7 months ago
A Dynamic Technique for Eliminating Buffer Overflow Vulnerabilities (and Other Memory Errors)
Buffer overflow vulnerabilities are caused by programming errors that allow an attacker to cause the program to write beyond the bounds of an allocated memory block to corrupt oth...
Martin C. Rinard, Cristian Cadar, Daniel Dumitran,...
146
Voted
ACSC
2004
IEEE
15 years 7 months ago
A RMI Protocol for Aglets
Aglets is a mobile agent system that allows an agent to move with its code and execution state across the network to interact with other entities. Aglets utilizes Java RMI to supp...
Feng Lu, Kris Bubendorfer
151
Voted
AINA
2004
IEEE
15 years 7 months ago
An Efficient Clustered Architecture for P2P Networks
Peer-to-peer (P2P) computing offers many attractive features, such as self-organization, load-balancing, availability, fault tolerance, and anonymity. However, it also faces some ...
Juan Li, Son T. Vuong
APCHI
2004
IEEE
15 years 7 months ago
Understanding Interaction Experience in Mobile Learning
The convergence of mobile technology and e-learning has generated considerable excitement among both practitioners and academics. Mass media continually promotes novel idea about m...
Fariza Hanis Abdul Razak
AMR
2006
Springer
108views Multimedia» more  AMR 2006»
15 years 7 months ago
Variation of Relevance Assessments for Medical Image Retrieval
Abstract. Evaluation is crucial for the success of most research domains, and image retrieval is no exception to this. Recently, several benchmarks have been developed for visual i...
Henning Müller, Paul Clough, William R. Hersh...
« Prev « First page 5193 / 5566 Last » Next »