Sciweavers

4138 search results - page 818 / 828
» Design and implementation of a network simulation system
Sort
View
143
Voted
SIGOPS
2010
130views more  SIGOPS 2010»
15 years 1 months ago
Storing and accessing live mashup content in the cloud
Today’s Rich Internet Application (RIA) technologies such as Ajax, Flex, or Silverlight, are designed around the client-server paradigm and cannot easily take advantage of repli...
Krzysztof Ostrowski, Ken Birman
118
Voted
ICCD
2008
IEEE
142views Hardware» more  ICCD 2008»
16 years 14 days ago
Making register file resistant to power analysis attacks
— Power analysis attacks are a type of side-channel attacks that exploits the power consumption of computing devices to retrieve secret information. They are very effective in br...
Shuo Wang, Fan Zhang, Jianwei Dai, Lei Wang, Zhiji...
ASPLOS
2006
ACM
15 years 9 months ago
Improving software security via runtime instruction-level taint checking
Current taint checking architectures monitor tainted data usage mainly with control transfer instructions. An alarm is raised once the program counter becomes tainted. However, su...
Jingfei Kong, Cliff Changchun Zou, Huiyang Zhou
134
Voted
ICMI
2005
Springer
164views Biometrics» more  ICMI 2005»
15 years 9 months ago
A user interface framework for multimodal VR interactions
This article presents a User Interface (UI) framework for multimodal interactions targeted at immersive virtual environments. Its configurable input and gesture processing compon...
Marc Erich Latoschik
150
Voted
HICSS
2002
IEEE
113views Biometrics» more  HICSS 2002»
15 years 8 months ago
Persona: A Contextualized and Personalized Web Search
Abstract— Recent advances in graph-based search techniques derived from Kleinberg’s work [1] have been impressive. This paper further improves the graph-based search algorithm ...
Francisco Tanudjaja, Lik Mu