Sciweavers

7651 search results - page 1520 / 1531
» Information integration in the enterprise
Sort
View
ACSAC
2010
IEEE
13 years 5 months ago
FIRM: capability-based inline mediation of Flash behaviors
The wide use of Flash technologies makes the security risks posed by Flash content an increasingly serious issue. Such risks cannot be effectively addressed by the Flash player, w...
Zhou Li, XiaoFeng Wang
FECS
2010
236views Education» more  FECS 2010»
13 years 5 months ago
Development of a system for teaching CS1 in C/C++ with Lego NXT robots
This paper describes the development of a system for teaching C/C++ using a LegoTM NXT in a CSI college course on introductory programming. The programming of the NXT robot has be...
Amy Delman, Adiba Ishak, Lawrence Goetz, Mikhail K...
GAMESEC
2010
244views Game Theory» more  GAMESEC 2010»
13 years 5 months ago
The Password Game: Negative Externalities from Weak Password Practices
The combination of username and password is widely used as a human authentication mechanism on the Web. Despite this universal adoption and despite their long tradition, password s...
Sören Preibusch, Joseph Bonneau
IPPS
2010
IEEE
13 years 5 months ago
Enhancing adaptive middleware for quantum chemistry applications with a database framework
Quantum chemistry applications such as the General Atomic and Molecular Electronic Structure System (GAMESS) that can execute on a complex peta-scale parallel computing environment...
Lakshminarasimhan Seshagiri, Meng-Shiou Wu, Masha ...
MICCAI
2010
Springer
13 years 5 months ago
Groupwise Registration by Hierarchical Anatomical Correspondence Detection
Groupwise registration has been widely investigated in recent years due to its importance in analyzing population data in many clinical applications. To our best knowledge, most o...
Guorong Wu, Qian Wang, Hongjun Jia, Dinggang Shen
« Prev « First page 1520 / 1531 Last » Next »