Sciweavers

10263 search results - page 2015 / 2053
» From Use Cases to System Operation Specifications
Sort
View
CHI
2008
ACM
14 years 9 months ago
Targeting across displayless space
Multi-monitor displays and multi-display environments are now common. Cross-display cursor movement, in which a user moves the pointer from one display to another, occurs frequent...
Miguel A. Nacenta, Regan L. Mandryk, Carl Gutwin
CCS
2009
ACM
14 years 3 months ago
As-awareness in Tor path selection
Tor is an anonymous communications network with thousands of router nodes worldwide. An intuition reflected in much of the literature on anonymous communications is that, as an a...
Matthew Edman, Paul F. Syverson
ICAC
2009
IEEE
14 years 3 months ago
vManage: loosely coupled platform and virtualization management in data centers
: © vManage: Loosely Coupled Platform and Virtualization Management in Data Centers Sanjay Kumar, Vanish Talwar, Vibhore Kumar, Parthasarathy Ranganathan, Karsten Schwan HP Labora...
Sanjay Kumar, Vanish Talwar, Vibhore Kumar, Partha...
ICST
2009
IEEE
14 years 3 months ago
Predicting Attack-prone Components
GEGICK, MICHAEL CHARLES. Predicting Attack-prone Components with Source Code Static Analyzers. (Under the direction of Laurie Williams). No single vulnerability detection techniqu...
Michael Gegick, Pete Rotella, Laurie A. Williams
IMC
2006
ACM
14 years 2 months ago
A multifaceted approach to understanding the botnet phenomenon
The academic community has long acknowledged the existence of malicious botnets, however to date, very little is known about the behavior of these distributed computing platforms....
Moheeb Abu Rajab, Jay Zarfoss, Fabian Monrose, And...
« Prev « First page 2015 / 2053 Last » Next »