Sciweavers

516 search results - page 26 / 104
» Comparing Two Information Flow Security Properties
Sort
View
CHI
2006
ACM
14 years 9 months ago
Clipping lists and change borders: improving multitasking efficiency with peripheral information design
Information workers often have to balance many tasks and interruptions. In this work, we explore peripheral display techniques that improve multitasking efficiency by helping user...
Tara Matthews, Mary Czerwinski, George G. Robertso...
ITIIS
2010
172views more  ITIIS 2010»
13 years 7 months ago
Combining Adaptive Filtering and IF Flows to Detect DDoS Attacks within a Router
Traffic matrix-based anomaly detection and DDoS attacks detection in networks are research focus in the network security and traffic measurement community. In this paper, firstly,...
Ruoyu Yan, Qinghua Zheng, Haifei Li
VMV
2008
190views Visualization» more  VMV 2008»
13 years 10 months ago
GPU-Based Streamlines for Surface-Guided 3D Flow Visualization
Visualizing 3D flow fields intrinsically suffers from problems of clutter and occlusion. A common practice to alleviate these issues is to restrict the visualization to feature su...
Markus Üffinger, Thomas Klein, Magnus Strenge...
GLOBECOM
2010
IEEE
13 years 6 months ago
On Comparing the Performance of Dynamic Multi-Network Optimizations
With a large variety of wireless access technologies available, multi-homed devices may strongly improve the performance and reliability of communication when using multiple networ...
Geert Jan Hoekstra, Robert D. van der Mei, J. W. B...
ESORICS
2000
Springer
14 years 12 days ago
Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code
Several authors have proposed using code modification as a technique for enforcing security policies such as resource limits, access controls, and network information flows. Howeve...
Ian Welch, Robert J. Stroud