Sciweavers

313 search results - page 24 / 63
» Privacy in Location-Aware Computing Environments
Sort
View
SP
2002
IEEE
165views Security Privacy» more  SP 2002»
13 years 7 months ago
NINJA: Java for high performance numerical computing
When Java was first introduced, there was a perception that its many benefits came at a significant performance cost. In the particularly performance-sensitive field of numerical ...
José E. Moreira, Samuel P. Midkiff, Manish ...
CCS
2008
ACM
13 years 10 months ago
BootJacker: compromising computers using forced restarts
BootJacker is a proof-of-concept attack tool which demonstrates that authentication mechanisms employed by an operating system can be bypassed by obtaining physical access and sim...
Ellick Chan, Jeffrey C. Carlyle, Francis M. David,...
ACSAC
2004
IEEE
13 years 11 months ago
High-Fidelity Modeling of Computer Network Worms
modeling, such as using epidemic models, has been the general method of choice for understanding and analyzing the high-level effects of worms. However, high-fidelity models, such...
Kalyan S. Perumalla, Srikanth Sundaragopalan
OOPSLA
2010
Springer
13 years 6 months ago
Programming with time: cyber-physical programming with impromptu
The act of computer programming is generally considered to be temporally removed from a computer program’s execution. In this paper we discuss the idea of programming as an acti...
Andrew Sorensen, Henry Gardner
CHI
1998
ACM
14 years 3 days ago
Awareness Driven Video Quality of Service in Collaborative Virtual Environments
We extend previous work on texture mapping video streams into virtual environments by introducing awareness driven video QoS. This uses movements within a shared virtual world to ...
Gail Reynard, Steve Benford, Chris Greenhalgh, Chr...