Sciweavers

739 search results - page 144 / 148
» Information Flow in Credential Systems
Sort
View
ICISS
2010
Springer
13 years 5 months ago
ValueGuard: Protection of Native Applications against Data-Only Buffer Overflows
Abstract. Code injection attacks that target the control-data of an application have been prevalent amongst exploit writers for over 20 years. Today however, these attacks are gett...
Steven Van Acker, Nick Nikiforakis, Pieter Philipp...
CHI
2005
ACM
14 years 8 months ago
Extending tangible interfaces for education: digital montessori-inspired manipulatives
This paper introduces a new framework for thinking about tangible interfaces in education, with specific focus on problem domains. Manipulatives are physical objects specifically ...
Oren Zuckerman, Saeed Arida, Mitchel Resnick
CHI
2009
ACM
14 years 2 months ago
O' game, can you feel my frustration?: improving user's gaming experience via stresscam
One of the major challenges of video game design is to have appropriate difficulty levels for users in order to maximize the entertainment value of the game. Game players may lose...
Chang Yun, Dvijesh Shastri, Ioannis Pavlidis, Zhig...
ACMACE
2006
ACM
14 years 1 months ago
Wireless home entertainment center: reducing last hop delays for real-time applications
Future digital entertainment services available to home users will share several characteristics: i) they will be deployed and delivered through the Internet, ii) a single media c...
Claudio E. Palazzi, Giovanni Pau, Marco Roccetti, ...
CAISE
2004
Springer
14 years 29 days ago
Network-based Business Process Management: a Discussion on Embedding Business Logic in Communications Networks
Advanced Business Process Management (BPM) tools enable the decomposition of previously integrated and often ill-defined processes into reusable process modules. These process modu...
Louis-François Pau, Peter H. M. Vervest