Sciweavers

548 search results - page 65 / 110
» Liberate Computer User from Programming
Sort
View
IJDE
2006
95views more  IJDE 2006»
13 years 7 months ago
Exploiting the Rootkit Paradox with Windows Memory Analysis
Rootkits are malicious programs that silently subvert an operating system to hide an intruder's activities. Although there are a number of tools designed to detect rootkits, ...
Jesse D. Kornblum
CG
2000
Springer
13 years 7 months ago
Sketching space
In this paper we present a sketch modelling system which we call Stilton. The program resembles a desktop VRML browser, allowing a user to navigate a 3D model in a perspective pro...
Alasdair Turner, David Chapman, Alan Penn
ISMIS
2003
Springer
14 years 25 days ago
Enacting an Agent-Based Digital Self in a 24x7 Web Services World
As broadband access to the Internet becomes pervasive, the need for a 24 hours a day, seven days a week (24x7) interface within the client devices, requires a level of sophisticati...
Steve Goschnick
DANCE
2002
IEEE
14 years 18 days ago
Towards an Active Network Architecture
Active networks allow their users to inject customized programs into the nodes of the network. An extreme case, in which we are most interested, replaces packets with “capsulesâ...
David L. Tennenhouse, David Wetherall
WWW
2005
ACM
14 years 8 months ago
Topic segmentation of message hierarchies for indexing and navigation support
Message hierarchies in web discussion boards grow with new postings. Threads of messages evolve as new postings focus within or diverge from the original themes of the threads. Th...
Jong Wook Kim, K. Selçuk Candan, Mehmet Emi...