Sciweavers

1186 search results - page 150 / 238
» Analysis of Virtual Workspaces
Sort
View
ICC
2008
IEEE
134views Communications» more  ICC 2008»
14 years 3 months ago
Secret Little Functions and Codebook for Protecting Users from Password Theft
—In this paper, we discuss how to prevent users’ passwords from being stolen by adversaries. We propose differentiated security mechanisms in which a user has the freedom to ch...
Yang Xiao, Chung-Chih Li, Ming Lei, Susan V. Vrbsk...
ECRTS
2007
IEEE
14 years 3 months ago
Predictable Paging in Real-Time Systems: A Compiler Approach
Conventionally, the use of virtual memory in real-time systems has been avoided, the main reason being the difficulties it provides to timing analysis. However, there is a trend ...
Isabelle Puaut, Damien Hardy
CCS
2007
ACM
14 years 3 months ago
Automated detection of persistent kernel control-flow attacks
This paper presents a new approach to dynamically monitoring operating system kernel integrity, based on a property called state-based control-flow integrity (SBCFI). Violations ...
Nick L. Petroni Jr., Michael W. Hicks
DOCENG
2006
ACM
14 years 2 months ago
Describing multistructured XML documents by means of delay nodes
Multistructured documents are documents whose structure is composed of a set of concurrent hierarchical structures. In this paper, we propose a new model of multistructured docume...
Jacques Le Maitre
SI3D
2006
ACM
14 years 2 months ago
Human hand modeling from surface anatomy
The human hand is an important interface with complex shape and movement. In virtual reality and gaming applications the use of an individualized rather than generic hand represen...
Taehyun Rhee, Ulrich Neumann, John P. Lewis