Sciweavers

808 search results - page 159 / 162
» Collaborative Networked Communication: MUDs as Systems Tools
Sort
View
EICS
2011
ACM
12 years 11 months ago
A model-based approach for distributed user interfaces
This paper describes a model-based approach for designing distributed user interfaces (DUIs), i.e. graphical user interfaces that are distributed along one or many of the followin...
Jérémie Melchior, Jean Vanderdonckt,...
CCS
2007
ACM
14 years 2 months ago
Memsherlock: an automated debugger for unknown memory corruption vulnerabilities
Software vulnerabilities have been the main contributing factor to the Internet security problems such as fast spreading worms. Among these software vulnerabilities, memory corrup...
Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu
IPCCC
2006
IEEE
14 years 2 months ago
Optimising malware
In recent years, malicious software (malware) has become one of the most insidious threats in computer security. However, this is arguably not the result of increased sophisticati...
José M. Fernandez, Pierre-Marc Bureau
CCS
2004
ACM
14 years 1 months ago
Testing network-based intrusion detection signatures using mutant exploits
Misuse-based intrusion detection systems rely on models of attacks to identify the manifestation of intrusive behavior. Therefore, the ability of these systems to reliably detect ...
Giovanni Vigna, William K. Robertson, Davide Balza...
HICSS
2003
IEEE
114views Biometrics» more  HICSS 2003»
14 years 1 months ago
Information in Health Care Process - Evaluation Toolkit Development
Increasing health care costs put a great strain on national economies. In recent years there have been several national and regional research and development projects in Finland a...
Heidi Häkkinen, Pekka Turunen, Ton A. M. Spil