Sciweavers

3608 search results - page 266 / 722
» computer 2011
Sort
View
DIMVA
2011
14 years 8 months ago
Code Pointer Masking: Hardening Applications against Code Injection Attacks
In this paper we present an efficient countermeasure against code injection attacks. Our countermeasure does not rely on secret values such as stack canaries and protects against a...
Pieter Philippaerts, Yves Younan, Stijn Muylle, Fr...
FOSSACS
2011
Springer
14 years 8 months ago
A Practical Linear Time Algorithm for Trivial Automata Model Checking of Higher-Order Recursion Schemes
The model checking of higher-order recursion schemes has been actively studied and is now becoming a basis of higher-order program verification. We propose a new algorithm for tri...
Naoki Kobayashi
QRE
2011
14 years 7 months ago
Phase II monitoring of covariance stationary autocorrelated processes
papers/abstracts/authors within each session. • The Author and Session indices provide cross-reference assistance (pages 33-36). • The floor plan on page 6 shows you where tech...
Marcus B. Perry, Gary R. Mercado, Joseph J. Pignat...
179
Voted
ER
2011
Springer
260views Database» more  ER 2011»
14 years 4 months ago
Service Variability Patterns
Service-oriented computing (SOC) increases flexibility of IT systems and helps enterprises to meet their changing needs. Different methods address changing requirements in service...
Ateeq Khan, Christian Kästner, Veit Köpp...
143
Voted
DCC
2011
IEEE
15 years 7 hour ago
Sparse Boolean equations and circuit lattices
Abstract. A system of Boolean equations is called sparse if each equation depends on a small number of variables. Finding efficiently solutions to the system is an underlying hard ...
Igor Semaev