Sciweavers

2642 search results - page 131 / 529
» The development of Chez Scheme
Sort
View
ISSRE
2010
IEEE
14 years 8 months ago
Preventing Overflow Attacks by Memory Randomization
Buffer overflow is known to be a common memory vulnerability affecting software. It is exploited to gain various kinds of privilege escalation. C and C++ are very commonly used to ...
Vivek Iyer, Amit Kanitkar, Partha Dasgupta, Raghun...
CISSE
2009
Springer
14 years 7 months ago
Optimal Component Selection for Component-Based Systems
In Component-based Software (CBS) development, it is desirable to choose software components that provide all necessary functionalities and at the same time optimize certain nonfun...
Muhammad Ali Khan, Sajjad Mahmood
JMLR
2010
101views more  JMLR 2010»
14 years 4 months ago
Classification Using Geometric Level Sets
A variational level set method is developed for the supervised classification problem. Nonlinear classifier decision boundaries are obtained by minimizing an energy functional tha...
Kush R. Varshney, Alan S. Willsky
INFOCOM
1999
IEEE
15 years 2 months ago
Periodic Broadcasting with VBR-Encoded Video
We consider designing near video on demand (VoD) systems that minimize start-up latency while maintaining high image quality. Recently several research teams have developed period...
Despina Saparilla, Keith W. Ross, Martin Reisslein
DELTA
2006
IEEE
15 years 1 months ago
Implementation of Four Real-Time Software Defined Receivers and a Space-Time Decoder using Xilinx Virtex 2 Pro Field Programmabl
This paper describes the concept, architecture, development and demonstration of a real time, high performance, software defined 4-receiver system and a space time decoder to be i...
Peter J. Green, Desmond P. Taylor