Sciweavers

9290 search results - page 1582 / 1858
» The Predictability of Data Values
Sort
View
ACSAC
2004
IEEE
15 years 8 months ago
A Dynamic Technique for Eliminating Buffer Overflow Vulnerabilities (and Other Memory Errors)
Buffer overflow vulnerabilities are caused by programming errors that allow an attacker to cause the program to write beyond the bounds of an allocated memory block to corrupt oth...
Martin C. Rinard, Cristian Cadar, Daniel Dumitran,...
ATAL
2006
Springer
15 years 8 months ago
Evolutionary Optimization of ZIP60: A Controlled Explosion in Hyperspace
The "ZIP" adaptive trading algorithm has been demonstrated to outperform human traders in experimental studies of continuous double auction (CDA) markets. The original Z...
Dave Cliff
FQAS
2006
Springer
101views Database» more  FQAS 2006»
15 years 8 months ago
Cooperative Discovery of Interesting Action Rules
Action rules introduced in [12] and extended further to e-action rules [21] have been investigated in [22], [13], [20]. They assume that attributes in a database are divided into t...
Agnieszka Dardzinska, Zbigniew W. Ras
143
Voted
ICALP
2000
Springer
15 years 8 months ago
Scalable Secure Storage when Half the System Is Faulty
In this paper, we provide a method to safely store a document in perhaps the most challenging settings, a highly decentralized replicated storage system where up to half of the st...
Noga Alon, Haim Kaplan, Michael Krivelevich, Dahli...
123
Voted
UIST
1995
ACM
15 years 8 months ago
Visual Interfaces for Solids Modeling
This paper exploresthe useof visualoperatorsfor solidsmodeling. We focus on designing interfaces for free-form operators such as blends, sweeps, and deformations, because these op...
Cindy Grimm, David Pugmire
« Prev « First page 1582 / 1858 Last » Next »