Sciweavers

1663 search results - page 130 / 333
» Computer Security in the Real World
Sort
View
144
Voted
RAID
2010
Springer
15 years 2 months ago
Detecting the Onset of Infection for Secure Hosts
Abstract. Software flaws in applications such as a browser may be exploited by attackers to launch drive-by-download (DBD), which has become the major vector of malware infection....
Kui Xu, Qiang Ma, Danfeng (Daphne) Yao
140
Voted
IPPS
2008
IEEE
15 years 10 months ago
The design of a versatile, secure P2PSIP communications architecture for the public internet
Communications systems, encompassing VoIP, IM, and other personal media, present different challenges for P2P environments than other P2P applications. In particular, reliable com...
David A. Bryan, Bruce Lowekamp, Marcia Zangrilli
140
Voted
CVPR
2003
IEEE
16 years 5 months ago
Low-Dimensional Representations of Shaded Surfaces under Varying Illumination
The aim of this paper is to find the best representation for the appearance of surfaces with Lambertian reflectance under varying illumination. Previous work using principal compo...
Peter Nillius, Jan-Olof Eklundh
138
Voted
CHI
2008
ACM
16 years 4 months ago
Human-Currency Interaction: learning from virtual currency use in China
What happens when the domains of HCI design and money intersect? This paper presents analyses from an ethnographic study of virtual currency use in China to discuss implications f...
Scott D. Mainwaring, Yang Wang 0005
PERCOM
2010
ACM
15 years 2 months ago
Predicting mobility events on personal devices
High-end mobile phones are quickly becoming versatile sensing platforms, capable of continuously capturing the dynamic context of their owners through various sensors. A change in...
Arjan J. H. Peddemors, Henk Eertink, Ignas G. Niem...