Sciweavers

1995 search results - page 385 / 399
» Belief in Information Flow
Sort
View
CSCW
2006
ACM
13 years 7 months ago
Loose Coupling and Healthcare Organizations: Deployment Strategies for Groupware
Healthcare organizations are often organized in a modular, loosely coupled fashion where separate and semi-autonomous work units specialize in different areas of care delivery. Thi...
David Pinelle, Carl Gutwin
TPDS
2008
133views more  TPDS 2008»
13 years 7 months ago
A More Practical Approach for Single-Packet IP Traceback using Packet Logging and Marking
Tracing IP packets back to their origins is an important step in defending the Internet against denial-of-service (DoS) attacks. Two kinds of IP traceback techniques have been prop...
Chao Gong, Kamil Saraç
ICISS
2010
Springer
13 years 5 months ago
ValueGuard: Protection of Native Applications against Data-Only Buffer Overflows
Abstract. Code injection attacks that target the control-data of an application have been prevalent amongst exploit writers for over 20 years. Today however, these attacks are gett...
Steven Van Acker, Nick Nikiforakis, Pieter Philipp...
CORR
2011
Springer
176views Education» more  CORR 2011»
13 years 2 months ago
Quantitative Synthesis for Concurrent Programs
nt programs, programming abstractions for data parallel programs, software model checking for confidentiality, electronic voting security, synthesis of interface specons for Java ...
Pavol Cerný, Krishnendu Chatterjee, Thomas ...
JOCN
2010
123views more  JOCN 2010»
13 years 2 months ago
Human Brain Dynamics Accompanying Use of Egocentric and Allocentric Reference Frames during Navigation
Maintaining spatial orientation while travelling requires integrating spatial information encountered from an egocentric viewpoint with accumulated information represented within ...
Klaus Gramann, Julie Onton, Davide Riccobon, Herma...