Sciweavers

120 search results - page 22 / 24
» Interpretation Beyond Markup
Sort
View
VEE
2006
ACM
142views Virtualization» more  VEE 2006»
14 years 1 months ago
Secure and practical defense against code-injection attacks using software dynamic translation
One of the most common forms of security attacks involves exploiting a vulnerability to inject malicious code into an executing application and then cause the injected code to be ...
Wei Hu, Jason Hiser, Daniel Williams, Adrian Filip...
ISMAR
2003
IEEE
14 years 19 days ago
Resolving Multiple Occluded Layers in Augmented Reality
A useful function of augmented reality (AR) systems is their ability to visualize occluded infrastructure directly in a user’s view of the environment. This is especially import...
Mark A. Livingston, J. Edward Swan II, Joseph L. G...
CCS
2006
ACM
13 years 11 months ago
Secure hierarchical in-network aggregation in sensor networks
In-network aggregation is an essential primitive for performing queries on sensor network data. However, most aggregation algorithms assume that all intermediate nodes are trusted...
Haowen Chan, Adrian Perrig, Dawn Xiaodong Song
MIE
2008
128views Healthcare» more  MIE 2008»
13 years 8 months ago
Interface Terminologies: Bridging the Gap between Theory and Reality for Africa
In the United States and Europe, electronic health records (EHRs) allow information technology and decision-support to facilitate the activities of clinicians and are considered a...
Andrew S. Kanter, Amy Y. Wang, Fred E. Masarie Jr....
ACL
2003
13 years 8 months ago
Accurate Unlexicalized Parsing
We demonstrate that an unlexicalized PCFG can parse much more accurately than previously shown, by making use of simple, linguistically motivated state splits, which break down fa...
Dan Klein, Christopher D. Manning