Sciweavers

7811 search results - page 1355 / 1563
» computing 2004
Sort
View
122
Voted
SEC
2004
15 years 5 months ago
Install-time Vaccination of Windows Executables to Defend Against Stack Smashing Attacks
Abstract--Stack smashing is still one of the most popular techniques for computer system attack. In this work, we present an antistack-smashing defense technique for Microsoft Wind...
Danny Nebenzahl, Avishai Wool
116
Voted
SERP
2004
15 years 5 months ago
Virtual UNR Campus: The Specification Process
The Virtual UNR Campus (VCam) presented in this paper is an interactive environment where users explore a 3D representation of the University of Nevada, Reno (UNR) campus. In esse...
Sergiu Dascalu, Frederick C. Harris Jr., Matthew K...
129
Voted
SERP
2004
15 years 5 months ago
Locating Features in Distributed Systems
In distributed systems, just as in conventional software, it is often necessary to locate the software components that implement a particular user feature. Several dynamic analysi...
Sharon Simmons, Dennis Edwards, Norman Wilde
107
Voted
SIMVIS
2004
15 years 5 months ago
Evaluation and Optimization of Laser Scan Data
The digitalization of objects from the real world is of great importance, e. g., in many multimedia applications, in 3D computer graphics, and in industrial measurement. In partic...
Christian Teutsch, Erik Trostmann, Michael Weber, ...
119
Voted
SODA
2004
ACM
110views Algorithms» more  SODA 2004»
15 years 5 months ago
Probabilistic analysis of knapsack core algorithms
We study the average-case performance of algorithms for the binary knapsack problem. Our focus lies on the analysis of so-called core algorithms, the predominant algorithmic conce...
René Beier, Berthold Vöcking
« Prev « First page 1355 / 1563 Last » Next »