Sciweavers

12697 search results - page 2411 / 2540
» Call for Papers
Sort
View
USS
2008
13 years 11 months ago
CloudAV: N-Version Antivirus in the Network Cloud
Antivirus software is one of the most widely used tools for detecting and stopping malicious and unwanted files. However, the long term effectiveness of traditional hostbased anti...
Jon Oberheide, Evan Cooke, Farnam Jahanian
USS
2008
13 years 11 months ago
Verifying Compliance of Trusted Programs
In this paper, we present an approach for verifying that trusted programs correctly enforce system security goals when deployed. A trusted program is trusted to only perform safe ...
Sandra Rueda, Dave King 0002, Trent Jaeger
ACMACE
2008
ACM
13 years 11 months ago
Mobile exergaming
With many industrialized societies bearing the cost of an increasingly sedentary on the health of their populations there is a need to find new ways of encouraging physical activi...
Carlos Garcia Wylie, Paul Coulton
ACMACE
2008
ACM
13 years 11 months ago
BragFish: exploring physical and social interaction in co-located handheld augmented reality games
In this paper, we present our research on social interaction in colocated handheld augmented reality (AR) games. These games are characterized by shared physical spaces that promo...
Yan Xu, Maribeth Gandy, Sami Deen, Brian Schrank, ...
AOSD
2008
ACM
13 years 11 months ago
"Program, enhance thyself!": demand-driven pattern-oriented program enhancement
Program enhancement refers to adding new functionality to an existing program. We argue that repetitive program enhancement tasks can be expressed as patterns, and that the applic...
Eli Tilevich, Godmar Back
« Prev « First page 2411 / 2540 Last » Next »