Sciweavers

11022 search results - page 2095 / 2205
» Programming Systems for Autonomy
Sort
View
IUI
2009
ACM
14 years 6 months ago
Trailblazer: enabling blind users to blaze trails through the web
For blind web users, completing tasks on the web can be frustrating. Each step can require a time-consuming linear search of the current web page to find the needed interactive e...
Jeffrey P. Bigham, Tessa A. Lau, Jeffrey Nichols
HICSS
2009
IEEE
96views Biometrics» more  HICSS 2009»
14 years 4 months ago
The Potential of Renewable Energy to Reduce the Dependence of the State of Hawaii on Oil
Deriving nearly 90% of its primary energy resources from oil, the State of Hawaii is more dependent on oil than any other U.S. state. The price of electricity in Hawaii is also mo...
Doug Arent, John Barnett, Gail Mosey, Alison Wise
IEEEARES
2009
IEEE
14 years 4 months ago
Capturing Information Flow with Concatenated Dynamic Taint Analysis
Dynamic taint analysis (DTA) is a technique used for tracking information flow by propagating taint propagation across memory locations during program execution. Most implementat...
Hyung Chan Kim, Angelos D. Keromytis, Michael Covi...
CCS
2009
ACM
14 years 4 months ago
Battle of Botcraft: fighting bots in online games with human observational proofs
The abuse of online games by automated programs, known as game bots, for gaining unfair advantages has plagued millions of participating players with escalating severity in recent...
Steven Gianvecchio, Zhenyu Wu, Mengjun Xie, Hainin...
CCS
2009
ACM
14 years 4 months ago
A practical property-based bootstrap architecture
Binary attestation, as proposed by the Trusted Computing Group (TCG), is a pragmatic approach for software integrity protection and verification. However, it has also various sho...
René Korthaus, Ahmad-Reza Sadeghi, Christia...
« Prev « First page 2095 / 2205 Last » Next »