Alfred Vaino Aho (born August 9, 1941 in Timmins, Ontario) is a Canadian computer scientist. Aho received a B.A.Sc. in Engineering Physics from the ...
Gaurav S. Kc - Mountain View CA, US Alfred V. Aho - Chatham NJ, US
Assignee:
The Trustees of Columbia University in the City of New York - New York NY
International Classification:
G06F 11/00 G06F 12/14 G06F 12/16 G08B 23/00
US Classification:
726 24, 713164, 713188, 726 25
Abstract:
A system for detecting and halting execution of malicious code includes a kernel-based system call interposition mechanism and a libc function interception mechanism. The kernel-based system call interposition mechanism detects a system call request from an application, determines a memory region from which the system call request emanates, and halts execution of the code responsible for the call request if the memory region from which the system call request emanates is a data memory region. The libc function interception mechanism maintains an alternative wrapper function for each of the relevant standard libc routines, intercepts a call from an application to one or more libc routines and redirects the call into the corresponding alternative wrapper function.
Methods, Systems, And Media For Detecting And Preventing Malcode Execution
Gaurav S. Kc - Mountain View CA, US Alfred V. Aho - Chatham NJ, US
International Classification:
G06F 11/00
US Classification:
726 24
Abstract:
A system for detecting and halting execution of malicious code includes a kernel-based system call interposition mechanism and a libc function interception mechanism. The kernel-based system call interposition mechanism detects a system call request from an application, determines a memory region from which the system call request emanates, and halts execution of the code responsible for the call request if the memory region from which the system call request emanates is a data memory region. The libc function interception mechanism maintains an alternative wrapper function for each of the relevant standard libc routines, intercepts a call from an application to one or more libc routines and redirects the call into the corresponding alternative wrapper function.
Method Of Operating A Portable Communication Device
Alfred Vaino Aho - Chatham NJ Richard Dennis Gitlin - Little Silver NJ Ramachandran Ramjee - Matawan NJ Thomas Yat Chung Woo - Red Bank NJ
Assignee:
Lucent Technologies Inc. - Murray Hill NJ
International Classification:
H04B 138
US Classification:
455552
Abstract:
A method of effectuating a change in the operation of a portable communication device such as a laptop or palmtop computer, a personal digital assistant (PDA), or a cellular telephone. The device can communicate with a remote host or server using one of two or more different communication arrangements. Various signals indicative of the environment in which the device is operating are monitored, to anticipate or predict a change or transition from one communication arrangement to the other. If the change is determined to be both imminent and significant, the operation change is effected substantially simultaneously, by changing parameters in the transport and/or application protocol layer in the device.
Three Dimensional Virtual Reality Enhancement Techniques
Alfred Vaino Aho - Chatham NJ Sudhir Raman Ahuja - Little Silver NJ Gianpaolo U. Carraro - Red Bank NJ James Robert Ensor - Red Bank NJ Eugene J. Rosenthal - Edison NJ
Assignee:
Lucent Technologies Inc. - Murray Hill NJ
International Classification:
G06T 1100
US Classification:
345433
Abstract:
For a world that has a portion of the world distant from the point of view of the user represented in only two dimensions as a video on a video screen, when an object on the video screen undergoes a trajectory that takes at least a portion of it to a location in the world that is not represented by the video but instead is a location in the world that is represented by computer graphics, in addition to being able to continue to see such an object when it is rendered as computer graphics in the computer graphics part of the world, i. e. , popped out from the video, one is able to interact with such an object. Thus, an object which pops out from a video into the computer graphics part of the world may be "investigated" by a viewer of the world. For example, the user could enter a store which popped out of the video, and engage in virtual shopping therein. The particular store which is actually entered may be customized on a per user basis, e. g.
News
Donald Knuth's 2023 Christmas Lecture: Making the Cells Dance
hristmas Past, Knuth looked back nearly half a century. The whole story starts with one of the first really great books on computer science, he told the audience, putting up his own dog-eared copy of The Design and Analysis of Computer Algorithms, by Alfred Aho, Jeffrey Ullman, and John Hopcroft.
Date: Dec 24, 2023
Category: Technology
Source: Google
Youtube
Alfred Aho (EngPhys 6T3)
Hall of Distinction: The Hall of Distinction is an assembly of extraor...
Duration:
1m 54s
Alfred Aho
Duration:
2m 32s
Alfred Aho - Bell Labs Role in Programming La...
More details:
Duration:
57m 7s
Turing Lecture 2021: Abstractions, Their Algo...
Turing Lecture 2021: Abstractions, Their Algorithms, and Their Compile...
Duration:
1h 33m 56s
"The Evolution of Programming Languages" Al ...
The speaker at the Summit Old Guard Math Interest Group on May 18, 202...
Duration:
1h 51m 47s
February 2022 CACM: Abstractions, Their Algor...
Turing Award recipients Alfred Aho and Jeffrey Ullman discuss "Abstrac...