Sciweavers

12336 search results - page 2419 / 2468
» Active Information Retrieval
Sort
View
CF
2004
ACM
14 years 3 months ago
Repairing return address stack for buffer overflow protection
Although many defense mechanisms against buffer overflow attacks have been proposed, buffer overflow vulnerability in software is still one of the most prevalent vulnerabilities e...
Yong-Joon Park, Gyungho Lee
DOCENG
2004
ACM
14 years 3 months ago
Page composition using PPML as a link-editing script
The advantages of a COG (Component Object Graphic) approach to the composition of PDF pages have been set out in a previous paper [1]. However, if pages are to be composed in this...
Steven R. Bagley, David F. Brailsford
ITICSE
2004
ACM
14 years 3 months ago
SQLator: an online SQL learning workbench
SQL (Structured Query Language) is one of the essential topics in foundation databases courses in higher education. Due to its apparent simple syntax, learning to use the full pow...
Shazia Wasim Sadiq, Maria E. Orlowska, Wasim Sadiq...
UIST
2004
ACM
14 years 3 months ago
DART: a toolkit for rapid design exploration of augmented reality experiences
In this paper, we describe The Designerʼs Augmented Reality Toolkit (DART). DART is built on top of Macromedia Director, a widely used multimedia development environment. We summ...
Blair MacIntyre, Maribeth Gandy, Steven Dow, Jay D...
CCS
2004
ACM
14 years 3 months ago
Web tap: detecting covert web traffic
As network security is a growing concern, system administrators lock down their networks by closing inbound ports and only allowing outbound communication over selected protocols ...
Kevin Borders, Atul Prakash
« Prev « First page 2419 / 2468 Last » Next »