Sciweavers

2081 search results - page 232 / 417
» codes 2006
Sort
View
ACSAC
2006
IEEE
15 years 5 months ago
Known/Chosen Key Attacks against Software Instruction Set Randomization
Instruction Set Randomization (ISR) has been proposed as a form of defense against binary code injection into an executing program. One proof-of-concept implementation is Randomiz...
Yoav Weiss, Elena Gabriela Barrantes
BIBE
2006
IEEE
123views Bioinformatics» more  BIBE 2006»
15 years 5 months ago
Isolation and Visualization of Codon Usage Biases
While genomic sequencing projects have proved an abundant source of information for biological studies ranging from the molecular to the ecological in scale, much of the informati...
Douglas W. Raiford, Dan E. Krane, Travis E. Doom, ...
DATE
2006
IEEE
123views Hardware» more  DATE 2006»
15 years 5 months ago
Constructing portable compiled instruction-set simulators: an ADL-driven approach
Instruction set simulators are common tools used for the development of new architectures and embedded software among countless other functions. This paper presents a framework th...
Joseph D'Errico, Wei Qin
DSN
2006
IEEE
15 years 5 months ago
Dependability Analysis of Virtual Memory Systems
Recent research has shown that even modern hard disks have complex failure modes that do not conform to “failstop” operation. Disks exhibit partial failures like block access ...
Lakshmi N. Bairavasundaram, Andrea C. Arpaci-Dusse...
HICSS
2006
IEEE
140views Biometrics» more  HICSS 2006»
15 years 5 months ago
Programming Education in the Era of the Internet: A Paradigm Shift
Over the last several years, the Computer Science (CS) community has put a great deal of effort in to the area of security research, and have made great advances. Counterintuitive...
Scott Harrison, Nadine Hanebutte, Jim Alves-Foss