Sciweavers

13370 search results - page 2637 / 2674
» Accessibility in Information Retrieval
Sort
View
USENIX
2007
13 years 10 months ago
From Trusted to Secure: Building and Executing Applications That Enforce System Security
Commercial operating systems have recently introduced mandatory access controls (MAC) that can be used to ensure system-wide data confidentiality and integrity. These protections...
Boniface Hicks, Sandra Rueda, Trent Jaeger, Patric...
USS
2008
13 years 10 months ago
Proactive Surge Protection: A Defense Mechanism for Bandwidth-Based Attacks
Large-scale bandwidth-based distributed denial-of-service (DDoS) attacks can quickly knock out substantial parts of a network before reactive defenses can respond. Even traffic flo...
Jerry Chi-Yuan Chou, Bill Lin, Subhabrata Sen, Oli...
ASPLOS
2008
ACM
13 years 9 months ago
Hardbound: architectural support for spatial safety of the C programming language
The C programming language is at least as well known for its absence of spatial memory safety guarantees (i.e., lack of bounds checking) as it is for its high performance. C'...
Joe Devietti, Colin Blundell, Milo M. K. Martin, S...
ASPLOS
2008
ACM
13 years 9 months ago
Archipelago: trading address space for reliability and security
Memory errors are a notorious source of security vulnerabilities that can lead to service interruptions, information leakage and unauthorized access. Because such errors are also ...
Vitaliy B. Lvin, Gene Novark, Emery D. Berger, Ben...
ASSETS
2008
ACM
13 years 9 months ago
Hunting for headings: sighted labeling vs. automatic classification of headings
Proper use of headings in web pages can make navigation more efficient for blind web users by indicating semantic di visions in the page. Unfortunately, many web pages do not use ...
Jeremy T. Brudvik, Jeffrey P. Bigham, Anna Cavende...
« Prev « First page 2637 / 2674 Last » Next »