First Page | Document Content | |
---|---|---|
Date: 2016-03-20 09:26:46Piscataway New Jersey Ubiquitous computing Ambient intelligence IEEE Computer Society Computational intelligence Institute of Electrical and Electronics Engineers Computer science Computing Academia Context-aware pervasive systems Sajal K. Das | [Please accept our apologies if you receive multiple copies of this email] **************************** IEEE PICom-2015 CFP *************************** The 13th IEEE International Conference on Pervasive Intelligence andAdd to Reading ListSource URL: cse.stfx.caDownload Document from Source WebsiteFile Size: 123,89 KBShare Document on Facebook |
IEEE COPYRIGHT LICENSE FORM FOR LIMITED USE WITH IEEE COMPUTER SOCIETY’S EXPERIMENTAL “DELAYED-OPEN ACCESS” MODEL TITLE OF WORK (hereinafter, "the Work"): AUTHOR(S): IEEE PUBLICATION TITLE: 2017 IEEE Symposium on SDocID: 1xUoR - View Document | |
1 Cloning your Gadgets: Complete ROP Attack Immunity with Multi-Variant Execution Stijn Volckaert, Bart Coppens, and Bjorn De Sutter, Member, IEEE Computer Society Abstract—In this paper, we present Disjoint Code LayoDocID: 1vg1S - View Document | |
Princeton Chapter of ACM / IEEE Computer SocietyDocID: 1vbIV - View Document | |
Princeton Chapter of ACM / IEEE Computer SocietyDocID: 1uO7Q - View Document | |
Princeton Chapter of ACM / IEEE Computer SocietyDocID: 1uHEn - View Document |