Sciweavers

841 search results - page 152 / 169
» RFIDs and Personal Privacy
Sort
View
CCS
2010
ACM
13 years 9 months ago
Detecting and characterizing social spam campaigns
Online social networks (OSNs) are popular collaboration and communication tools for millions of users and their friends. Unfortunately, in the wrong hands, they are also effective...
Hongyu Gao, Jun Hu, Christo Wilson, Zhichun Li, Ya...
CCS
2010
ACM
13 years 9 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
OOPSLA
2010
Springer
13 years 7 months ago
Cross-language, type-safe, and transparent object sharing for co-located managed runtimes
As software becomes increasingly complex and difficult to analyze, it is more and more common for developers to use high-level, type-safe, object-oriented (OO) programming langua...
Michal Wegiel, Chandra Krintz
OOPSLA
2010
Springer
13 years 7 months ago
Supporting dynamic, third-party code customizations in JavaScript using aspects
Web sites and web browsers have recently evolved into platforms on top of which entire applications are delivered dynamically, mostly as JavaScript source code. This delivery form...
Benjamin S. Lerner, Herman Venter, Dan Grossman
OOPSLA
2010
Springer
13 years 7 months ago
An input-centric paradigm for program dynamic optimizations
Accurately predicting program behaviors (e.g., locality, dependency, method calling frequency) is fundamental for program optimizations and runtime adaptations. Despite decades of...
Kai Tian, Yunlian Jiang, Eddy Z. Zhang, Xipeng She...