Sciweavers

577 search results - page 99 / 116
» Actions in context
Sort
View
ICFP
2012
ACM
11 years 10 months ago
Addressing covert termination and timing channels in concurrent information flow systems
When termination of a program is observable by an adversary, confidential information may be leaked by terminating accordingly. While this termination covert channel has limited ...
Deian Stefan, Alejandro Russo, Pablo Buiras, Amit ...
CHI
2005
ACM
14 years 8 months ago
When participants do the capturing: the role of media in diary studies
In this paper, we investigate how the choice of media for capture and access affects the diary study method. The diary study is a method of understanding participant behavior and ...
Scott Carter, Jennifer Mankoff
WWW
2010
ACM
14 years 2 months ago
Atomate it! end-user context-sensitive automation using heterogeneous information sources on the web
The transition of personal information management (PIM) tools off the desktop to the Web presents an opportunity to augment these tools with capabilities provided by the wealth o...
Max Van Kleek, Brennan Moore, David R. Karger, Pau...
CCS
2009
ACM
14 years 2 months ago
Battle of Botcraft: fighting bots in online games with human observational proofs
The abuse of online games by automated programs, known as game bots, for gaining unfair advantages has plagued millions of participating players with escalating severity in recent...
Steven Gianvecchio, Zhenyu Wu, Mengjun Xie, Hainin...
OOPSLA
2005
Springer
14 years 1 months ago
Finding application errors and security flaws using PQL: a program query language
A number of effective error detection tools have been built in recent years to check if a program conforms to certain design rules. An important class of design rules deals with s...
Michael C. Martin, V. Benjamin Livshits, Monica S....