Sciweavers

1618 search results - page 143 / 324
» Privacy Interfaces for Information Management
Sort
View
CHI
2008
ACM
14 years 9 months ago
CareLog: a selective archiving tool for behavior management in schools
Identifying the function of problem behavior can lead to the development of more effective interventions. One way to identify the function is through functional behavior assessmen...
Gillian R. Hayes, Lamar M. Gardere, Gregory D. Abo...
AVI
2004
13 years 10 months ago
Scalable Fabric: flexible task management
Our studies have shown that as displays become larger, users leave more windows open for easy multitasking. A larger number of windows, however, may increase the time that users s...
George G. Robertson, Eric Horvitz, Mary Czerwinski...
SP
2009
IEEE
144views Security Privacy» more  SP 2009»
14 years 3 months ago
Native Client: A Sandbox for Portable, Untrusted x86 Native Code
This paper describes the design, implementation and evaluation of Native Client, a sandbox for untrusted x86 native code. Native Client aims to give browser-based applications the...
Bennet Yee, David Sehr, Gregory Dardyk, J. Bradley...
ACSAC
2001
IEEE
14 years 25 days ago
Architecture and Applications for a Distributed Embedded Firewall
The distributed firewall is an important new line of network defense. It provides fine-grained access control to augment the protections afforded by the traditional perimeter fire...
Charles Payne, Tom Markham
JDCTA
2008
83views more  JDCTA 2008»
13 years 9 months ago
Translation from GDMO/ASN.1 to tML/Schema
For interoperation of heterogeneous management systems and integration of existing legacy applications in telecommunication network management systems, a translation from GDMO/ASN...
Wenli Dong