Sciweavers

4095 search results - page 57 / 819
» How to test a tree
Sort
View
ACSAC
2006
IEEE
14 years 1 months ago
How to Automatically and Accurately Sandbox Microsoft IIS
Comparing the system call sequence of a network application against a sandboxing policy is a popular approach to detecting control-hijacking attack, in which the attacker exploits...
Wei Li, Lap-Chung Lam, Tzi-cker Chiueh
CSCW
2004
ACM
14 years 1 months ago
Avoiding interference: how people use spatial separation and partitioning in SDG workspaces
Single Display Groupware (SDG) lets multiple co-located people, each with their own input device, interact simultaneously over a single communal display. While SDG is beneficial, ...
Edward Tse, Jonathan Histon, Stacey D. Scott, Saul...
PET
2010
Springer
13 years 11 months ago
How Unique Is Your Web Browser?
We investigate the degree to which modern web browsers are subject to “device fingerprinting” via the version and configuration information that they will transmit to website...
Peter Eckersley
HOTOS
2007
IEEE
13 years 11 months ago
HotComments: How to Make Program Comments More Useful?
Program comments have long been used as a common practice for improving inter-programmer communication and code readability, by explicitly specifying programmers' intentions ...
Lin Tan, Ding Yuan, Yuanyuan Zhou
GECCO
2006
Springer
170views Optimization» more  GECCO 2006»
13 years 11 months ago
How an optimal observer can collapse the search space
Many metaheuristics have difficulty exploring their search space comprehensively. Exploration time and efficiency are highly dependent on the size and the ruggedness of the search...
Christophe Philemotte, Hugues Bersini