Sciweavers

325 search results - page 18 / 65
» Designing Good Deceptions in Defense of Information Systems
Sort
View
CCS
2009
ACM
14 years 2 months ago
XCS: cross channel scripting and its impact on web applications
We study the security of embedded web servers used in consumer electronic devices, such as security cameras and photo frames, and for IT infrastructure, such as wireless access po...
Hristo Bojinov, Elie Bursztein, Dan Boneh
USS
2010
13 years 5 months ago
Cling: A Memory Allocator to Mitigate Dangling Pointers
Use-after-free vulnerabilities exploiting so-called dangling pointers to deallocated objects are just as dangerous as buffer overflows: they may enable arbitrary code execution. U...
Periklis Akritidis
CHI
2010
ACM
14 years 2 months ago
OneBusAway: results from providing real-time arrival information for public transit
Public transit systems play an important role in combating traffic congestion, reducing carbon emissions, and promoting compact, sustainable urban communities. The usability of p...
Brian Ferris, Kari Watkins, Alan Borning
WWW
2003
ACM
14 years 8 months ago
Efficient URL caching for world wide web crawling
Crawling the web is deceptively simple: the basic algorithm is (a) Fetch a page (b) Parse it to extract all linked URLs (c) For all the URLs not seen before, repeat (a)?(c). Howev...
Andrei Z. Broder, Marc Najork, Janet L. Wiener
CHI
2004
ACM
14 years 8 months ago
What a to-do: studies of task management towards the design of a personal task list manager
This paper reports on the results of studies of task management to support the design of a task list manager. We examined the media used to record and organize to-dos and tracked ...
Victoria Bellotti, Brinda Dalal, Nathaniel Good, P...