Sciweavers

3819 search results - page 674 / 764
» Predicting Dependability by Testing
Sort
View
DASFAA
2009
IEEE
195views Database» more  DASFAA 2009»
15 years 4 months ago
The XMLBench Project: Comparison of Fast, Multi-platform XML libraries
The XML technologies have brought a lot of new ideas and abilities in the field of information management systems. Nowadays, XML is used almost everywhere: from small configurati...
Suren Chilingaryan
CLEAR
2007
Springer
175views Biometrics» more  CLEAR 2007»
15 years 4 months ago
The IBM RT07 Evaluation Systems for Speaker Diarization on Lecture Meetings
We present the IBM systems for the Rich Transcription 2007 (RT07) speaker diarization evaluation task on lecture meeting data. We first overview our baseline system that was devel...
Jing Huang, Etienne Marcheret, Karthik Visweswaria...
MIDDLEWARE
2007
Springer
15 years 4 months ago
Dynamic multi-process information flow tracking for web application security
Although there is a large body of research on detection and prevention of such memory corruption attacks as buffer overflow, integer overflow, and format string attacks, the web...
Susanta Nanda, Lap-Chung Lam, Tzi-cker Chiueh
SP
2006
IEEE
214views Security Privacy» more  SP 2006»
15 years 4 months ago
Automatically Generating Malicious Disks using Symbolic Execution
Many current systems allow data produced by potentially malicious sources to be mounted as a file system. File system code must check this data for dangerous values or invariant ...
Junfeng Yang, Can Sar, Paul Twohey, Cristian Cadar...
FCCM
2005
IEEE
132views VLSI» more  FCCM 2005»
15 years 3 months ago
Hardware Factorization Based on Elliptic Curve Method
The security of the most popular asymmetric cryptographic scheme RSA depends on the hardness of factoring large numbers. The best known method for factorization large integers is ...
Martin Simka, Jan Pelzl, Thorsten Kleinjung, Jens ...