Sciweavers

46 search results - page 6 / 10
» Hardening soft information sources
Sort
View
PLDI
2009
ACM
15 years 10 months ago
SoftBound: highly compatible and complete spatial memory safety for c
The serious bugs and security vulnerabilities facilitated by C/C++'s lack of bounds checking are well known, yet C and C++ remain in widespread use. Unfortunately, C's a...
Santosh Nagarakatte, Jianzhou Zhao, Milo M. K. Mar...
CGF
2008
137views more  CGF 2008»
14 years 9 months ago
Real-Time Indirect Illumination and Soft Shadows in Dynamic Scenes Using Spherical Lights
We present a method for rendering approximate soft shadows and diffuse indirect illumination in dynamic scenes. The proposed method approximates the original scene geometry with a...
P. Guerrero, Stefan Jeschke, Michael Wimmer
ACSAC
2005
IEEE
15 years 3 months ago
Java for Mobile Devices: A Security Study
Java 2 Micro-Edition Connected Limited Device Configuration (J2ME CLDC) is the platform of choice when it comes to running mobile applications on resourceconstrained devices (cel...
Mourad Debbabi, Mohamed Saleh, Chamseddine Talhi, ...
ICASSP
2008
IEEE
15 years 4 months ago
Maximum a posteriori ICA: Applying prior knowledge to the separation of acoustic sources
Independent component analysis (ICA) for convolutive mixtures is often applied in the frequency domain due to the desirable decoupling into independent instantaneous mixtures per ...
Graham W. Taylor, Michael L. Seltzer, Alex Acero
ICASSP
2010
IEEE
14 years 10 months ago
Robust IP and UDP-lite header recovery for packetized multimedia transmission
Recently, Joint Source-Channel Decoding (JSCD) techniques have been proposed to improve the reception of multimedia contents transmitted over error-prone channels. These technique...
François Mériaux, Michel Kieffer