Sciweavers

8094 search results - page 299 / 1619
» Improvements in Formula Generalization
Sort
View
CCS
2007
ACM
15 years 10 months ago
Improving vulnerability discovery models
Security researchers are applying software reliability models to vulnerability data, in an attempt to model the vulnerability discovery process. I show that most current work on t...
Andy Ozment
ICMI
2007
Springer
138views Biometrics» more  ICMI 2007»
15 years 10 months ago
Speech-filtered bubble ray: improving target acquisition on display walls
The rapid development of large interactive wall displays has been accompanied by research on methods that allow people to interact with the display at a distance. The basic method...
Edward Tse, Mark S. Hancock, Saul Greenberg
IWMM
2007
Springer
146views Hardware» more  IWMM 2007»
15 years 10 months ago
Allocation-phase aware thread scheduling policies to improve garbage collection performance
Past studies have shown that objects are created and then die in phases. Thus, one way to sustain good garbage collection efficiency is to have a large enough heap to allow many ...
Feng Xian, Witawas Srisa-an, Hong Jiang
ASPLOS
2006
ACM
15 years 10 months ago
Improving software security via runtime instruction-level taint checking
Current taint checking architectures monitor tainted data usage mainly with control transfer instructions. An alarm is raised once the program counter becomes tainted. However, su...
Jingfei Kong, Cliff Changchun Zou, Huiyang Zhou
148
Voted
HRI
2006
ACM
15 years 10 months ago
Changing shape: improving situation awareness for a polymorphic robot
Polymorphic, or shape-shifting, robots can normally tackle more types of tasks than non-polymorphic robots due to their flexible morphology. Their versatility adds to the challeng...
Jill L. Drury, Holly A. Yanco, Whitney Howell, Bri...