Sciweavers

353 search results - page 15 / 71
» The C Hackers Guide
Sort
View
CCS
2008
ACM
14 years 11 months ago
A practical mimicry attack against powerful system-call monitors
System-call monitoring has become the basis for many hostbased intrusion detection as well as policy enforcement techniques. Mimicry attacks attempt to evade system-call monitorin...
Chetan Parampalli, R. Sekar, Rob Johnson
CLEF
2008
Springer
14 years 11 months ago
GeoCLEF 2008: The CLEF 2008 Cross-Language Geographic Information Retrieval Track Overview
GeoCLEF is an evaluation initiative for testing queries with a geographic specification in large set of text documents. GeoCLEF ran a regular track for the third time within the C...
Thomas Mandl, Paula Carvalho, Giorgio Maria Di Nun...

Book
5690views
16 years 7 months ago
The OpenGL Reference Manual - The Bluebook
"This manual is designed to be used as the companion reference volume to the OpenGL Programming Guide by Jackie Neider, Tom Davis, and Mason Woo (Reading, MA: Addison-Wesley P...
Dave Shreiner
ICS
2001
Tsinghua U.
15 years 2 months ago
Computer aided hand tuning (CAHT): "applying case-based reasoning to performance tuning"
For most parallel and high performance systems, tuning guides provide the users with advices to optimize the execution time of their programs. Execution time may be very sensitive...
Antoine Monsifrot, François Bodin
ENTER
2007
Springer
15 years 1 months ago
Developing Web-Based Tourist Information Tools Using Google Map
This paper reports an explanatory study of using Google Map API to develop two destinationspecific tourist information tools: a handheld tour guide and an online trip planner for ...
Bing Pan, John C. Crotts, Brian Muller