Font Size: a A A
Keyword [exploit]
Result: 61 - 80 | Page: 4 of 5
61. Research And Implementation Of Web Security Audit System Based On Graph Traversal
62. Research On Software Vulnerability Detection Based On Vulnerability Genes
63. Research On The Development Of Cultural And Creative Products Of Hanyangling Museum
64. Detection, Diagnosis and Mitigation of Malicious Javascript with Enriched Javascript Execution
65. Finding the bad in good code: Automated return-oriented programming exploit discovery
66. Diversity in cooperative networks: How to achieve and where to exploit
67. Exploiting locality of interaction in networked distributed POMDPs: An empirical evaluatio
68. Exploiting transmit channel side information in MIMO wireless systems
69. A measurement-driven approach to designing peer-to-peer systems
70. Analyzing and Accelerating Runtime Systems on Multicore Architecture
71. Sparse Signal Recovery Exploiting Spatiotemporal Correlation
72. Exploiting Data-Parallelism in GPUs
73. Detecting exploit patterns from network packet streams
74. Learning to exploit dynamics for robot motor coordination
75. Further Results on the Differential Geometric Approach to Nonlinear Systems Affine in Control
76. The timekeeping methodology: Exploiting generational behavior to improve processor power and performance
77. An efficient methodology to exploit OR-parallelism on distributed memory systems
78. Prefetch mechanisms that acquire and exploit application specific knowledge
79. Enabling Runtime Profiling to Hide and Exploit Heterogeneity within Chip Heterogeneous Multiprocessor Systems (CHMPS)
80. Exploiting prior knowledge in compressed sensing wireless ECG systems
  <<First  <Prev  Next>  Last>>  Jump to