Sciweavers

2598 search results - page 513 / 520
» New Features to Identify Computer Generated Images
Sort
View
NDSS
2007
IEEE
15 years 4 months ago
RICH: Automatically Protecting Against Integer-Based Vulnerabilities
We present the design and implementation of RICH (Run-time Integer CHecking), a tool for efficiently detecting integer-based attacks against C programs at run time. C integer bug...
David Brumley, Dawn Xiaodong Song, Tzi-cker Chiueh...
CONEXT
2006
ACM
15 years 3 months ago
Migrating home agents towards internet-scale mobility deployments
While the IETF standardization process of the Mobile IPv6 and Network Mobility (NEMO) protocols is almost complete, their large-scale deployment is not yet possible. With these te...
Ryuji Wakikawa, Guillaume Valadon, Jun Murai
IWCMC
2006
ACM
15 years 3 months ago
Load balancing in the call admission control of heterogeneous wireless networks
In the next generation wireless systems (NGWS) the end user will be able to connect to any of the different available access networks. The end user will also be able to roam seaml...
Kamil H. Suleiman, H. Anthony Chan, Mqhele E. Dlod...
84
Voted
IPPS
2005
IEEE
15 years 3 months ago
An Empirical Study On the Vectorization of Multimedia Applications for Multimedia Extensions
Multimedia extensions (MME) are architectural extensions to general-purpose processors to boost the performance of multimedia workloads. Today, in-line assembly code, intrinsic fu...
Gang Ren, Peng Wu, David A. Padua
ICS
2004
Tsinghua U.
15 years 3 months ago
Evaluating support for global address space languages on the Cray X1
The Cray X1 was recently introduced as the first in a new line of parallel systems to combine high-bandwidth vector processing with an MPP system architecture. Alongside capabili...
Christian Bell, Wei-Yu Chen, Dan Bonachea, Katheri...