Sciweavers

1994 search results - page 280 / 399
» Limited Software Warranties
Sort
View
ASPLOS
2006
ACM
14 years 3 months ago
A performance counter architecture for computing accurate CPI components
Cycles per Instruction (CPI) stacks break down processor execution time into a baseline CPI plus a number of miss event CPI components. CPI breakdowns can be very helpful in gaini...
Stijn Eyerman, Lieven Eeckhout, Tejas Karkhanis, J...
UIST
2006
ACM
14 years 3 months ago
Pen-top feedback for paper-based interfaces
Current paper-based interfaces such as PapierCraft, provide very little feedback and this limits the scope of possible interactions. So far, there has been little systematic explo...
Chunyuan Liao, François Guimbretière...
ACSAC
2005
IEEE
14 years 2 months ago
e-NeXSh: Achieving an Effectively Non-Executable Stack and Heap via System-Call Policing
We present e-NeXSh, a novel security approach that utilises kernel and LIBC support for efficiently defending systems against process-subversion attacks. Such attacks exploit vul...
Gaurav S. Kc, Angelos D. Keromytis
ACSAC
2005
IEEE
14 years 2 months ago
Detecting Intra-enterprise Scanning Worms based on Address Resolution
Signature-based schemes for detecting Internet worms often fail on zero-day worms, and their ability to rapidly react to new threats is typically limited by the requirement of som...
David Whyte, Paul C. van Oorschot, Evangelos Krana...
ACSC
2005
IEEE
14 years 2 months ago
The Effect of Context and Application Type on Mobile Usability: An Empirical Study
This paper discusses the effect of context on mobile usability, proposes an expanded model of mobile application context, and conducts an empirical study to test a number of hypot...
Caspar Ryan, Atish Gonsalves