Sciweavers

1925 search results - page 331 / 385
» Documenting software systems with views
Sort
View
SP
2008
IEEE
144views Security Privacy» more  SP 2008»
15 years 10 months ago
Cloaker: Hardware Supported Rootkit Concealment
Rootkits are used by malicious attackers who desire to run software on a compromised machine without being detected. They have become stealthier over the years as a consequence of...
Francis M. David, Ellick Chan, Jeffrey C. Carlyle,...
UIST
2006
ACM
15 years 10 months ago
Summarizing personal web browsing sessions
We describe a system, implemented as a browser extension, that enables users to quickly and easily collect, view, and share personal Web content. Our system employs a novel intera...
Mira Dontcheva, Steven M. Drucker, Geraldine Wade,...
UIST
2004
ACM
15 years 10 months ago
Interacting with hidden content using content-aware free-space transparency
We present content-aware free-space transparency, an approach to viewing and manipulating the otherwise hidden content of obscured windows through unimportant regions of overlappi...
Edward W. Ishak, Steven Feiner
IEEEPACT
2003
IEEE
15 years 9 months ago
Reactive Multi-Word Synchronization for Multiprocessors
Shared memory multiprocessor systems typically provide a set of hardware primitives in order to support synchronization. Generally, they provide single-word read-modify-write hard...
Phuong Hoai Ha, Philippas Tsigas
PERCOM
2003
ACM
15 years 9 months ago
An Architecture that Treats Everyday Objects as Communicating Tangible Components
The paper describes research that has been carried out in “extrovert-Gadgets”, a research project funded in the context of EU IST/FET proactive initiative “Disappearing Comp...
Achilles Kameas, Stephen J. Bellis, Irene Mavromma...