Sciweavers

104 search results - page 10 / 21
» Poly-controlled partial evaluation in practice
Sort
View
132
Voted
WINET
2010
179views more  WINET 2010»
15 years 5 days ago
Achieving robust message authentication in sensor networks: a public-key based approach
Given the extremely limited hardware resources on sensor nodes and the inclement deploying environment, the adversary Denial-of-Service (DoS) attack becomes a serious security thre...
Haodong Wang, Qun Li
ACSAC
2010
IEEE
14 years 12 months ago
G-Free: defeating return-oriented programming through gadget-less binaries
Despite the numerous prevention and protection mechanisms that have been introduced into modern operating systems, the exploitation of memory corruption vulnerabilities still repr...
Kaan Onarlioglu, Leyla Bilge, Andrea Lanzi, Davide...
CAI
2011
Springer
14 years 8 months ago
Email Analysis and Information Extraction for Enterprise Benefit
In spite of rapid advances in multimedia and interactive technologies, enterprise users prefer to battle with email spam and overload rather than lose the benefits of communicatin...
Michal Laclavik, Stefan Dlugolinsky, Martin Seleng...
JMLR
2012
13 years 4 months ago
Structured Output Learning with High Order Loss Functions
Often when modeling structured domains, it is desirable to leverage information that is not naturally expressed as simply a label. Examples include knowledge about the evaluation ...
Daniel Tarlow, Richard S. Zemel
SIGIR
2011
ACM
14 years 4 months ago
ViewSer: enabling large-scale remote user studies of web search examination and interaction
Web search behaviour studies, including eye-tracking studies of search result examination, have resulted in numerous insights to improve search result quality and presentation. Ye...
Dmitry Lagun, Eugene Agichtein