Sciweavers

15379 search results - page 370 / 3076
» Protecting users from
Sort
View
CCS
2009
ACM
16 years 4 months ago
Lightweight self-protecting JavaScript
This paper introduces a method to control JavaScript execution. The aim is to prevent or modify inappropriate behaviour caused by e.g. malicious injected scripts or poorly designe...
Phu H. Phung, David Sands, Andrey Chudnov
ICC
2007
IEEE
153views Communications» more  ICC 2007»
15 years 10 months ago
Mapping for Iterative MMSE-SIC with Belief Propagation
Abstract— In Multiple-Input Multiple-Output (MIMO) wireless systems, since different signals are transmitted by different antennas simultaneously, interference occurs between the...
Satoshi Gounai, Tomoaki Ohtsuki
TDSC
2010
119views more  TDSC 2010»
14 years 10 months ago
On the General Applicability of Instruction-Set Randomization
We describe Instruction-Set Randomization (ISR), a general approach for safeguarding systems against any type of code-injection attack. We apply Kerckhoffs' principle to creat...
Stephen W. Boyd, Gaurav S. Kc, Michael E. Locasto,...
ICMI
2003
Springer
150views Biometrics» more  ICMI 2003»
15 years 9 months ago
Capturing user tests in a multimodal, multidevice informal prototyping tool
Interaction designers are increasingly faced with the challenge of creating interfaces that incorporate multiple input modalities, such as pen and speech, and span multiple device...
Anoop K. Sinha, James A. Landay
CORR
2006
Springer
119views Education» more  CORR 2006»
15 years 4 months ago
Broadcast Cooperation Strategies for Two Colocated Users
This work considers the problem of communication from a single transmitter, over a network with colocated users, through an independent block Rayleigh fading channel. The colocati...
Avi Steiner, Amichai Sanderovich, Shlomo Shamai