Sciweavers

2335 search results - page 343 / 467
» Securing Distributed Systems with Information Flow Control
Sort
View
USS
2004
15 years 3 months ago
Static Disassembly of Obfuscated Binaries
Disassembly is the process of recovering a symbolic representation of a program's machine code instructions from its binary representation. Recently, a number of techniques h...
Christopher Krügel, William K. Robertson, Fre...
SI3D
2010
ACM
15 years 2 months ago
Interactive painterly stylization of images, videos and 3D animations
We introduce a real-time system that converts images, video, or 3D animation sequences to artistic renderings in various painterly styles. The algorithm, which is entirely execute...
Jingwan Lu, Pedro V. Sander, Adam Finkelstein
WISEC
2010
ACM
15 years 2 months ago
Attacks on physical-layer identification
Physical-layer identification of wireless devices, commonly referred to as Radio Frequency (RF) fingerprinting, is the process of identifying a device based on transmission imperf...
Boris Danev, Heinrich Luecken, Srdjan Capkun, Kari...
83
Voted
HPCA
2009
IEEE
16 years 2 months ago
Lightweight predication support for out of order processors
The benefits of Out of Order (OOO) processing are well known, as is the effectiveness of predicated execution for unpredictable control flow. However, as previous research has dem...
Mark Stephenson, Lixin Zhang, Ram Rangan
207
Voted
VLDB
2001
ACM
126views Database» more  VLDB 2001»
16 years 2 months ago
XML-enabled workflow management for e-services across heterogeneous platforms
Advanced e-services require efficient, flexible, and easy-to-use workflow technology that integrates well with mainstream Internet technologies like XML and Web servers. This pape...
German Shegalov, Michael Gillmann, Gerhard Weikum