Sciweavers

923 search results - page 38 / 185
» Improved Slide Attacks
Sort
View
CCS
2010
ACM
15 years 7 hour ago
DieHarder: securing the heap
Heap-based attacks depend on a combination of memory management errors and an exploitable memory allocator. We analyze a range of widely-deployed memory allocators, including thos...
Gene Novark, Emery D. Berger
PAAMS
2010
Springer
14 years 9 months ago
Unsupervised Visualization of SQL Attacks by Means of the SCMAS Architecture
This paper presents an improvement of the SCMAS architecture aimed at securing SQL-run databases. The main goal of such architecture is the detection and prevention of SQL injectio...
Álvaro Herrero, Cristian Pinzón, Emi...
WWW
2004
ACM
16 years 14 days ago
Post-processing inkml for random-access navigation of voluminous handwritten ink documents
The goal of this research is the improvement of browsing voluminous InkML data in two areas: ease of rendering continuous inkflow for replay-browsing, and ease of random access na...
Khaireel A. Mohamed, Lioudmila Belenkaia, Thomas O...
CHI
2005
ACM
16 years 6 days ago
Livenotes: a system for cooperative and augmented note-taking in lectures
We describe Livenotes, a shared whiteboard system and educational practice that uses wireless communication and tablet computing to support real-time conversations within small gr...
Matthew Kam, Jingtao Wang, Alastair Iles, Eric Tse...
IDA
2003
Springer
15 years 5 months ago
Obtaining Quality Microarray Data via Image Reconstruction
Abstract. This paper introduces a novel method for processing spotted microarray images, inspired from image reconstruction. Instead of the usual approach that focuses on the signa...
Paul O'Neill, George D. Magoulas, Xiaohui Liu