Sciweavers

620 search results - page 47 / 124
» Methods and Practical Issues in Evaluating Alignment Techniq...
Sort
View
ACSAC
2010
IEEE
14 years 11 months ago
G-Free: defeating return-oriented programming through gadget-less binaries
Despite the numerous prevention and protection mechanisms that have been introduced into modern operating systems, the exploitation of memory corruption vulnerabilities still repr...
Kaan Onarlioglu, Leyla Bilge, Andrea Lanzi, Davide...
TVCG
2011
121views more  TVCG 2011»
14 years 8 months ago
GPU-Assisted Computation of Centroidal Voronoi Tessellation
—Centroidal Voronoi tessellations (CVT) are widely used in computational science and engineering. The most commonly used method is Lloyd’s method, and recently the L-BFGS metho...
Guodong Rong, Yang Liu, Wenping Wang, Xiaotian Yin...
SIGCOMM
2012
ACM
13 years 3 months ago
ShadowStream: performance evaluation as a capability in production internet live streaming networks
As live streaming networks grow in scale and complexity, they are becoming increasingly difficult to evaluate. Existing evaluation methods including lab/testbed testing, simulati...
Chen Tian, Richard Alimi, Yang Richard Yang, David...
CRYPTO
2012
Springer
234views Cryptology» more  CRYPTO 2012»
13 years 3 months ago
Homomorphic Evaluation of the AES Circuit
We describe a working implementation of leveled homomorphic encryption (without bootstrapping) that can evaluate the AES-128 circuit in three different ways. One variant takes und...
Craig Gentry, Shai Halevi, Nigel P. Smart
DAGSTUHL
1996
15 years 2 months ago
A Uniform Approach for Compile-Time and Run-Time Specialization
As partial evaluation gets more mature, it is now possible to use this program transformation technique to tackle realistic languages and real-size application programs. However, t...
Charles Consel, Luke Hornof, François No&eu...