Sciweavers

10908 search results - page 2154 / 2182
» Requirements Engineering Tasks
Sort
View
USENIX
2007
13 years 12 months ago
Dynamic Spyware Analysis
Spyware is a class of malicious code that is surreptitiously installed on victims’ machines. Once active, it silently monitors the behavior of users, records their web surfing ...
Manuel Egele, Christopher Kruegel, Engin Kirda, He...
ASPLOS
2008
ACM
13 years 11 months ago
Hardbound: architectural support for spatial safety of the C programming language
The C programming language is at least as well known for its absence of spatial memory safety guarantees (i.e., lack of bounds checking) as it is for its high performance. C'...
Joe Devietti, Colin Blundell, Milo M. K. Martin, S...
ATAL
2008
Springer
13 years 11 months ago
Emotional reading of medical texts using conversational agents
In this paper, we present a prototype that helps visualizing the relative importance of sentences extracted from medical texts using Embodied Conversational Agents (ECA). We propo...
Gersende Georg, Catherine Pelachaud, Marc Cavazza
CCS
2008
ACM
13 years 11 months ago
Formal analysis of SAML 2.0 web browser single sign-on: breaking the SAML-based single sign-on for google apps
Single-Sign-On (SSO) protocols enable companies to establish a federated environment in which clients sign in the system once and yet are able to access to services offered by dif...
Alessandro Armando, Roberto Carbone, Luca Compagna...
CCS
2008
ACM
13 years 11 months ago
A security architecture for transient trust
In extraordinary situations, certain individuals may require access to information for which they are not normally authorized. For example, to facilitate rescue of people trapped ...
Cynthia E. Irvine, Timothy E. Levin, Paul C. Clark...
« Prev « First page 2154 / 2182 Last » Next »