Sciweavers

35419 search results - page 191 / 7084
» How are we doing
Sort
View
IEEEARES
2008
IEEE
15 years 10 months ago
How to Open a File and Not Get Hacked
Careless attention to opening files, often caused by problems with path traversal or shared directories, can expose applications to attacks on the file names that they use. In t...
James A. Kupsch, Barton P. Miller
KI
2007
Springer
15 years 10 months ago
How to Handle Incomplete Knowledge Concerning Moving Objects
In this paper, we present a way of how to handle incomplete knowledge concerning moving objects. Our approach is based on the basic Qualitative Trajectory Calculus (QTCB), which is...
Nico Van de Weghe, Peter Bogaert, Anthony G. Cohn,...
FSTTCS
2005
Springer
15 years 10 months ago
Extending Howe's Method to Early Bisimulations for Typed Mobile Embedded Resources with Local Names
We extend Howe’s method to prove that input-early strong and -delay contextual bisimulations are congruences for the Higher-order mobile embedded resources (Homer) calculus, a ty...
Jens Chr. Godskesen, Thomas T. Hildebrandt
ACMDIS
2000
ACM
15 years 8 months ago
Touch Me, Hit Me and I Know How You Feel: A Design Approach to Emotionally Rich Interaction
In this paper we propose a 3-step method for designing emotionally rich interactions, illustrated by the design of an alarm clock. By emotionally rich interaction we understand in...
Stephan Wensveen, Kees Overbeeke, J. P. Djajadinin...
USENIX
2001
15 years 5 months ago
Heimdal and Windows 2000 Kerberos - How to Get Them to Play Together
As a practical means of achieving better security and single sign-on, the Kerberos network authentication system has been in wide use in the Unix world for many years. Microsoft h...
Assar Westerlund, Johan Danielsson