Sciweavers

400 search results - page 72 / 80
» Enabling Personal Privacy for Pervasive Computing Environmen...
Sort
View
ACSAC
2010
IEEE
13 years 5 months ago
Fast and practical instruction-set randomization for commodity systems
Instruction-set randomization (ISR) is a technique based on randomizing the "language" understood by a system to protect it from code-injection attacks. Such attacks wer...
Georgios Portokalidis, Angelos D. Keromytis
CCS
2010
ACM
13 years 7 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
CHI
2009
ACM
14 years 8 months ago
Lightweight tagging expands information and activity management practices
Could people use tagging to manage day-to-day work in their personal computing environment? Could tagging be sufficiently generic and lightweight to support diverse ways of workin...
Gerard Oleksik, Max L. Wilson, Craig S. Tashman, E...
CHI
1999
ACM
13 years 12 months ago
Interactive 3D Sound Hyperstories for Blind Children
Interactive software is currently used for learning and entertainment purposes. This type of software is not very common among blind children because most computer games and elect...
Mauricio Lumbreras, Jaime Sánchez
ATAL
2007
Springer
14 years 1 months ago
Estimating information value in collaborative multi-agent planning systems
This paper addresses the problem of identifying the value of information held by a teammate on a distributed, multi-agent team. It focuses on a distributed scheduling task in whic...
David Sarne, Barbara J. Grosz