Sciweavers

9974 search results - page 1948 / 1995
» Software Interconnection Models
Sort
View
NDSS
2007
IEEE
15 years 8 months ago
RICH: Automatically Protecting Against Integer-Based Vulnerabilities
We present the design and implementation of RICH (Run-time Integer CHecking), a tool for efficiently detecting integer-based attacks against C programs at run time. C integer bug...
David Brumley, Dawn Xiaodong Song, Tzi-cker Chiueh...
VTC
2007
IEEE
105views Communications» more  VTC 2007»
15 years 7 months ago
Random Beamforming OFDMA for Future Generation Cellular Communication Systems
—This paper presents a downlink performance analysis of a Layered Random Beamforming (LRB) - MIMO-OFDMA Physical Layer (PHY) as applicable to future generation wireless communica...
Congzheng Han, Angela Doufexi, Simon Armour, Joe M...
CCS
2007
ACM
15 years 7 months ago
Protecting users from "themselves"
Computer usage and threat models have changed drastically since the advent of access control systems in the 1960s. Instead of multiple users sharing a single file system, each us...
William Enck, Sandra Rueda, Joshua Schiffman, Yoge...
CDVE
2007
Springer
124views Visualization» more  CDVE 2007»
15 years 7 months ago
"Integrare", a Collaborative Environment for Behavior-Oriented Design
In order to build complex, large-scale, dependable systems it is necessary to use a development environment with an integrated set of capabilities that supports editing and formal...
Lian Wen, Robert Colvin, Kai Lin, John Seagrott, N...
CLEF
2007
Springer
15 years 7 months ago
Cross-Lingual Information Retrieval System for Indian Languages
This paper describes our first participation in the Indian language sub-task of the main Adhoc monolingual and bilingual track in CLEF1 competition. In this track, the task is to...
Jagadeesh Jagarlamudi, A. Kumaran
« Prev « First page 1948 / 1995 Last » Next »