Sciweavers

371 search results - page 13 / 75
» From the Guest Editor
Sort
View
CCS
2009
ACM
14 years 2 months ago
Secure in-VM monitoring using hardware virtualization
Kernel-level attacks or rootkits can compromise the security of an operating system by executing with the privilege of the kernel. Current approaches use virtualization to gain hi...
Monirul I. Sharif, Wenke Lee, Weidong Cui, Andrea ...
EWHCI
1995
13 years 11 months ago
Generating Editors for Direct Manipulation of Diagrams
Diagrams (e.g., trees for hierarchical structures, or graphs for finite state machines) are often needed as part of advanced user interfaces, and are frequently specific to a use...
Gerhard Viehstaedt, Mark Minas
VL
1994
IEEE
159views Visual Languages» more  VL 1994»
13 years 11 months ago
Interaction in Really Graphical User Interfaces
Employing diagrams in the UI causes problems that don't exist in so called Graphical User Interfaces. We are implementing a tool for generating editors for a certain class of...
Gerhard Viehstaedt, Mark Minas
ECOOP
2012
Springer
11 years 10 months ago
Enhancing JavaScript with Transactions
Abstract. Transcript is a system that enhances JavaScript with support for transactions. Hosting Web applications can use transactions to demarcate regions that contain untrusted g...
Mohan Dhawan, Chung-chieh Shan, Vinod Ganapathy
WIKIS
2009
ACM
14 years 2 months ago
Bipartite networks of Wikipedia's articles and authors: a meso-level approach
This exploratory study investigates the bipartite network of articles linked by common editors in Wikipedia, ‘The Free Encyclopedia that Anyone Can Edit’. We use the articles ...
Rut Jesus, Martin Schwartz, Sune Lehmann