Sciweavers

169 search results - page 9 / 34
» Malicious interface design: exploiting the user
Sort
View
CCS
2010
ACM
13 years 7 months ago
BLADE: an attack-agnostic approach for preventing drive-by malware infections
Web-based surreptitious malware infections (i.e., drive-by downloads) have become the primary method used to deliver malicious software onto computers across the Internet. To addr...
Long Lu, Vinod Yegneswaran, Phillip A. Porras, Wen...
CCS
2010
ACM
13 years 12 months ago
Controlling data disclosure in computational PIR protocols
Private Information Retrieval (PIR) protocols allow users to learn data items stored at a server which is not fully trusted, without disclosing to the server the particular data e...
Ning Shang, Gabriel Ghinita, Yongbin Zhou, Elisa B...
UIST
2006
ACM
14 years 1 months ago
WindowScape: a task oriented window manager
We propose WindowScape, a window manager that uses a photograph metaphor for lightweight, post hoc task management. This is the first task management windowing model to provide in...
Craig S. Tashman
CORR
2010
Springer
218views Education» more  CORR 2010»
13 years 4 months ago
User Centered and Ontology Based Information Retrieval System for Life Sciences
Because of the increasing number of electronic data, designing efficient tools to retrieve and exploit documents is a major challenge. Current search engines suffer from two main d...
Sylvie Ranwez, Vincent Ranwez, Mohameth-Fran&ccedi...
CORR
2002
Springer
156views Education» more  CORR 2002»
13 years 7 months ago
MPICH-G2: A Grid-Enabled Implementation of the Message Passing Interface
Application development for distributed-computing ``Grids'' can benefit from tools that variously hide or enable application-level management of critical aspects of the ...
Nicholas T. Karonis, Brian R. Toonen, Ian T. Foste...