Sciweavers

1268 search results - page 93 / 254
» High Impact Requirements Engineering
Sort
View
ISSRE
2010
IEEE
14 years 11 months ago
Preventing Overflow Attacks by Memory Randomization
Buffer overflow is known to be a common memory vulnerability affecting software. It is exploited to gain various kinds of privilege escalation. C and C++ are very commonly used to ...
Vivek Iyer, Amit Kanitkar, Partha Dasgupta, Raghun...
ICSE
2005
IEEE-ACM
16 years 1 months ago
Static analysis tools as early indicators of pre-release defect density
During software development it is helpful to obtain early estimates of the defect density of software components. Such estimates identify fault-prone areas of code requiring furth...
Nachiappan Nagappan, Thomas Ball
SIGCOMM
1997
ACM
15 years 5 months ago
Internet Routing Instability
Abstract—This paper examines the network interdomain routing information exchanged between backbone service providers at the major U.S. public Internet exchange points. Internet ...
Craig Labovitz, G. Robert Malan, Farnam Jahanian
ISMS
2004
Springer
15 years 6 months ago
An Interactive Parallel Multigrid FEM Simulator
Physically based modeling of deformable objects such as cloth or human tissue has grown to be very important for virtual simulations. However, interactive simulation of these nonl...
Xunlei Wu, Tolga Goktekin, Frank Tendick
ICIP
2008
IEEE
16 years 3 months ago
Parallel CABAC for low power video coding
With the growing presence of high definition video content on battery-operated handheld devices such as camera phones, digital still cameras, digital camcorders, and personal medi...
Vivienne Sze, Anantha P. Chandrakasan, Madhukar Bu...