Sciweavers

3618 search results - page 122 / 724
» Enabling or disabling technologies
Sort
View
ATAL
2009
Springer
13 years 10 months ago
Implementing Collective Obligations in Human-Agent Teams Using KAoS Policies
Obligations can apply to individuals, either severally or collectively. When applied severally, each individual or member of a team is independently responsible to fulfill the obli...
Jurriaan van Diggelen, Jeffrey M. Bradshaw, Matthe...
IJISEC
2006
106views more  IJISEC 2006»
13 years 9 months ago
Execution transactions for defending against software failures: use and evaluation
We examine the problem of containing buffer overflow attacks in a safe and efficient manner. Briefly, we automatically augment source code to dynamically catch stack and heap-based...
Stelios Sidiroglou, Angelos D. Keromytis
ICMLA
2009
13 years 7 months ago
Feature Extraction and Classification of EEG Signals for Rapid P300 Mind Spelling
The Mind Speller is a Brain-Computer Interface which enables subjects to spell text on a computer screen by detecting P300 Event-Related Potentials in their electroencephalograms....
Adrien Combaz, Nikolay V. Manyakov, Nikolay Chumer...
CHI
2011
ACM
13 years 26 days ago
OldGen: mobile phone personalization for older adults
Mobile devices are currently difficult to customize for the usability needs of elderly users. The elderly are instead referred to specially designed “senior phones” or softwar...
Alex Olwal, Dimitris Lachanas, Ermioni Zacharouli
WWW
2009
ACM
14 years 10 months ago
Using static analysis for Ajax intrusion detection
We present a static control-flow analysis for JavaScript programs running in a web browser. Our analysis tackles numerous challenges posed by modern web applications including asy...
Arjun Guha, Shriram Krishnamurthi, Trevor Jim