Sciweavers

1278 search results - page 39 / 256
» The representation of policies as system objects
Sort
View
ACL
1992
13 years 8 months ago
The Representation of Multimodal User Interface Dialogues Using Discourse Pegs
The three-tiered discourse representation defined in (Luperfoy, 1991) is applied to multimodal humancomputer interface (HCI) dialogues. In the applied system the three tiers are (...
Susann LuperFoy
CCS
2007
ACM
14 years 1 months ago
Dynamic pharming attacks and locked same-origin policies for web browsers
We describe a new attack against web authentication, which we call dynamic pharming. Dynamic pharming works by hijacking DNS and sending the victim’s browser malicious Javascrip...
Chris Karlof, Umesh Shankar, J. Doug Tygar, David ...
APCSAC
2003
IEEE
14 years 29 days ago
User-Level Management of Kernel Memory
Abstract. Kernel memory is a resource that must be managed carefully in order to ensure the efficiency and safety of the system. The use of an inappropriate management policy can w...
Andreas Haeberlen, Kevin Elphinstone
RTAS
2000
IEEE
14 years 2 days ago
Evaluating Policies and Mechanisms for Supporting Embedded, Real-Time Applications with CORBA 3.0
To be an effective platform for performance-sensitive realtime systems, commercial-off-the-shelf (COTS) distributed object computing (DOC) middleware must support application qual...
Carlos O'Ryan, Douglas C. Schmidt, Fred Kuhns, Mar...
MOBISYS
2005
ACM
14 years 7 months ago
Horde: separating network striping policy from mechanism
Inverse multiplexing, or network striping, allows the construction of a high-bandwidth virtual channel from a collection of multiple low-bandwidth network channels. Striping syste...
Asfandyar Qureshi, John V. Guttag