Results 1 - 10
of
35
Shoestring: Probabilistic Soft Error Reliability on the Cheap
"... Aggressive technology scaling provides designers with an ever increasing budget of cheaper and faster transistors. Unfortunately, this trend is accompanied by a decline in individual device reliability as transistors become increasingly susceptible to soft errors. We are quickly approaching a new er ..."
Abstract
-
Cited by 24 (3 self)
- Add to MetaCart
time, and exploiting low-cost, symptom-based error detection, Shoestring is able to focus its efforts on protecting statistically-vulnerable portions of program code. Shoestring effectively applies instruction duplication to protect only those segments of code that, when subjected to a soft error
mity P ul 15 Worm virulence estimation Maximum likelihood estimation
"... ex ning and ithe wor nd m estimation method applies statistical sampling and estimation theory while using a Botnet, which is a can pro s in w major latest identifying vulnerable target systems. For example, routable scan-ning worms [6,7] can select targets only in the routable address space by usin ..."
Abstract
- Add to MetaCart
ex ning and ithe wor nd m estimation method applies statistical sampling and estimation theory while using a Botnet, which is a can pro s in w major latest identifying vulnerable target systems. For example, routable scan-ning worms [6,7] can select targets only in the routable address space
ORI GIN AL PA PER Tornado shelters and the manufactured home parks
"... Abstract Manufactured or mobile homes represent a fast growing portion of the housing market but are particularly vulnerable to tornadoes. In the US over 40 % of tornado fatalities occur in mobile homes even though they comprise about 8 % of US housing units. We examine the market for tornado shelte ..."
Abstract
- Add to MetaCart
Abstract Manufactured or mobile homes represent a fast growing portion of the housing market but are particularly vulnerable to tornadoes. In the US over 40 % of tornado fatalities occur in mobile homes even though they comprise about 8 % of US housing units. We examine the market for tornado
Patient Outcomes When Hospitals Experience a Surge in Admissions
- Journal of Health Economics
, 2006
"... In January of 2004, a California law passed in 1999 became effective regulating minimum nurse to patient ratios in hospital units. This legislation is prompted by results from previous research showing that a lower staffing ratio causes adverse patient outcomes. In this study, we use a census of hos ..."
Abstract
-
Cited by 14 (1 self)
- Add to MetaCart
qualitatively small and statistically insignificant effects of weekend admission shocks on mortality rates of patients admitted on Thursdays. These results suggest that the portion of the California law designed to guarantee adequate staffing when the patient census increases unexpectedly should have little
Using Greedy Hamiltonian Call Paths to Detect Stack Smashing Attacks
- IN THE PROCEEDINGS OF THE 7 TH INFORMATION SECURITY CONFERENCE
, 2004
"... The ICAT statistics over the past few years have shown at least one out of every five CVE and CVE candidate vulnerabilities have been due to buffer overflows. This constitutes a significant portion of today’s computer related security concerns. In this paper we introduce a novel method for detectin ..."
Abstract
-
Cited by 1 (1 self)
- Add to MetaCart
The ICAT statistics over the past few years have shown at least one out of every five CVE and CVE candidate vulnerabilities have been due to buffer overflows. This constitutes a significant portion of today’s computer related security concerns. In this paper we introduce a novel method
Plagiarism Detection in Obfuscated Documents Using an N-gram Technique
"... Plagiarism is considered as a major problem these days especially in case of academic institutions. Very often students present someone else’s work as their own and they are given credit for it. Therefore, we have to integrate plagiarism checking into the submission process which includes usage of p ..."
Abstract
- Add to MetaCart
of plagiarism detection software. In this paper we focus on vulnerabilities of this software from the view of different obfuscations. We briefly introduce our statistical approach that should quite well detect obfuscated documents in case larger portion of the document is obfuscated. We show limits
SPADE: Statistical Packet Acceptance Defense Engine
"... Abstract — A security engine should detect network traffic attacks at line-speed. “Learning ” capabilities can help detecting new and unknown threats even before a vulnerability is exploited. The principal way for achieving this goal is to model anticipated network traffic behavior, and to use this ..."
Abstract
- Add to MetaCart
Abstract — A security engine should detect network traffic attacks at line-speed. “Learning ” capabilities can help detecting new and unknown threats even before a vulnerability is exploited. The principal way for achieving this goal is to model anticipated network traffic behavior, and to use
Improving the Reliability of On-Chip Data Caches Under Process Variations
"... On-chip caches take a large portion of the chip area. They are much more vulnerable to parameter variation than smaller units. As leakage current becomes a significant component of the total power consumption, the leakage current variations induced thermal and reliability problem to the onchip cache ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
On-chip caches take a large portion of the chip area. They are much more vulnerable to parameter variation than smaller units. As leakage current becomes a significant component of the total power consumption, the leakage current variations induced thermal and reliability problem to the onchip
Detection and Prevention of SQL Injection Attacks 1
"... Abstract—The Internet and web applications are playing very important role in our today‘s modern day life. Several activities of our daily life like browsing, online shopping and booking of travel tickets are becoming easier by the use of web applications. Most of the web applications use the databa ..."
Abstract
- Add to MetaCart
the database as a back-end to store critical information such as user credentials, financial and payment information, company statistics etc. An SQL injection attack targets web applications that are database-driven. This is done by including portions of SQL statements in a web form entry field in an attempt
CHARACTERISTICS OF RAT MYOCARDIAL
"... TIn our investigation,we used short-time model of myocardial infarction of rats induced by high dose of isoproterenol (ISP). We investigated cardiac troponin T blood level (cTnT) and histologi-cal characteristics of rat myocardium. ISP, single, intraperitoneal dose mg/kg was given to male, adult, ..."
Abstract
- Add to MetaCart
of myocardial necrosis in rats. Suben-docardial portion of myocardium was more vulnerability than subepicardial portion. Rats of ISP II had more extensive histological changes than these in ISP I. Administered doses of ISP enabled cTnT utilization as a marker of myocardial necrosis.
Results 1 - 10
of
35