Sciweavers

350 search results - page 31 / 70
» Improving application security with data flow assertions
Sort
View
CHI
2009
ACM
14 years 8 months ago
Natural throw and tilt interaction between mobile phones and distant displays
Raimund Dachselt University of Magdeburg Faculty of Computer Science User Interface & Software Engineering Group 39106 Magdeburg, Germany dachselt@acm.org Robert Buchholz Unive...
Raimund Dachselt, Robert Buchholz
CCS
2009
ACM
14 years 2 months ago
Secure in-VM monitoring using hardware virtualization
Kernel-level attacks or rootkits can compromise the security of an operating system by executing with the privilege of the kernel. Current approaches use virtualization to gain hi...
Monirul I. Sharif, Wenke Lee, Weidong Cui, Andrea ...
CVPR
2004
IEEE
13 years 11 months ago
Visual Object Categorization Using Distance-Based Discriminant Analysis
This paper formulates the problem of object categorization in the discriminant analysis framework focusing on transforming visual feature data so as to make it conform to the comp...
Serhiy Kosinov, Stéphane Marchand-Maillet, ...
ATAL
2009
Springer
14 years 2 months ago
Computing optimal randomized resource allocations for massive security games
Predictable allocations of security resources such as police officers, canine units, or checkpoints are vulnerable to exploitation by attackers. Recent work has applied game-theo...
Christopher Kiekintveld, Manish Jain, Jason Tsai, ...
VEE
2010
ACM
291views Virtualization» more  VEE 2010»
14 years 2 months ago
Neon: system support for derived data management
Modern organizations face increasingly complex information management requirements. A combination of commercial needs, legal liability and regulatory imperatives has created a pat...
Qing Zhang, John McCullough, Justin Ma, Nabil Sche...