Sciweavers

2555 search results - page 133 / 511
» Quantifiers and Working Memory
Sort
View
SRDS
2007
IEEE
15 years 9 months ago
Characterizing Aging Phenomena of the Java Virtual Machine
In this work we investigate software aging phenomena inside the Java Virtual Machine (JVM). Starting from an experimental campaign on real world testbeds, this work isolates the c...
Domenico Cotroneo, Salvatore Orlando 0002, Stefano...
115
Voted
IWIA
2005
IEEE
15 years 9 months ago
A Methodology for Designing Countermeasures against Current and Future Code Injection Attacks
This paper proposes a methodology to develop countermeasures against code injection attacks, and validates the methodology by working out a specific countermeasure. This methodol...
Yves Younan, Wouter Joosen, Frank Piessens
PDPTA
1997
15 years 4 months ago
DIPC: A System Software Solution for Distributed Programming
Distributed Inter-Process Communication (DIPC) provides the programmers of the Linux operating system with distributed programming facilities, including Distributed Shared Memory ...
Kamran Karimi, Mohsen Sharifi
176
Voted
FSE
2011
Springer
218views Cryptology» more  FSE 2011»
14 years 7 months ago
Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function
In this paper, we present new results on the second-round SHA-3 candidate ECHO. We describe a method to construct a collision in the compression function of ECHO-256 reduced to fou...
Jérémy Jean, Pierre-Alain Fouque
EMNLP
2009
15 years 1 months ago
Integrating sentence- and word-level error identification for disfluency correction
While speaking spontaneously, speakers often make errors such as self-correction or false starts which interfere with the successful application of natural language processing tec...
Erin Fitzgerald, Frederick Jelinek, Keith Hall