Sciweavers

23406 search results - page 4470 / 4682
» Architecture, Design, Implementation
Sort
View
SOUPS
2005
ACM
15 years 10 months ago
The battle against phishing: Dynamic Security Skins
Phishing is a model problem for illustrating usability concerns of privacy and security because both system designers and attackers battle using user interfaces to guide (or misgu...
Rachna Dhamija, J. Doug Tygar
VEE
2005
ACM
140views Virtualization» more  VEE 2005»
15 years 10 months ago
Planning for code buffer management in distributed virtual execution environments
Virtual execution environments have become increasingly useful in system implementation, with dynamic translation techniques being an important component for performance-critical ...
Shukang Zhou, Bruce R. Childers, Mary Lou Soffa
VRST
2005
ACM
15 years 10 months ago
An integrated system: virtual reality, haptics and modern sensing technique (VHS) for post-stroke rehabilitation
In this paper, we introduce an interdisciplinary project, involving researchers from the fields of Physical Therapy, Computer Science, Psychology, Communication and Cell Neurobiol...
Shih-Ching Yeh, Albert A. Rizzo, Weirong Zhu, Jill...
WOSP
2005
ACM
15 years 10 months ago
A model transformation framework for the automated building of performance models from UML models
In order to effectively validate the performance of software systems throughout their development cycle it is necessary to continuously build performance models from software mod...
Andrea D'Ambrogio
CIKM
2005
Springer
15 years 10 months ago
Compact reachability labeling for graph-structured data
Testing reachability between nodes in a graph is a well-known problem with many important applications, including knowledge representation, program analysis, and more recently, bi...
Hao He, Haixun Wang, Jun Yang 0001, Philip S. Yu
« Prev « First page 4470 / 4682 Last » Next »