Sciweavers

418 search results - page 2 / 84
» Many Happy Returns
Sort
View
CISC
2006
Springer
81views Cryptology» more  CISC 2006»
13 years 10 months ago
Return Address Randomization Scheme for Annuling Data-Injection Buffer Overflow Attacks
Buffer overflow(BOF) has been the most common form of vulnerability in software systems today, and many methods exist to defend software systems against BOF attacks. Among them, th...
Deok Jin Kim, Tae Hyung Kim, Jong Kim, Sung Je Hon...
TREC
2000
13 years 7 months ago
Query Expansion Seen Through Return Order of Relevant Documents
There is a reservoir of knowledge in data from the TREC evaluations that analysis of precision and recall leaves untapped. This knowledge leads to better understanding of query ex...
Walter Liggett, Chris Buckley
HIPC
2005
Springer
14 years 7 hour ago
Scheduling Divisible Loads with Return Messages on Heterogeneous Master-Worker Platforms
Abstract In this paper, we consider the problem of scheduling divisible loads onto an heterogeneous star platform, with both heterogeneous computing and communication resources. We...
Olivier Beaumont, Loris Marchal, Yves Robert
CF
2004
ACM
13 years 12 months ago
Repairing return address stack for buffer overflow protection
Although many defense mechanisms against buffer overflow attacks have been proposed, buffer overflow vulnerability in software is still one of the most prevalent vulnerabilities e...
Yong-Joon Park, Gyungho Lee
ATAL
2011
Springer
12 years 6 months ago
Maximizing revenue in symmetric resource allocation systems when user utilities exhibit diminishing returns
Consumers of resources in realistic applications (e.g., web, multimedia) typically derive diminishing-return utilities from the amount of resource they receive. A resource provide...
Roie Zivan, Miroslav Dudík, Praveen Paruchu...