Sciweavers

797 search results - page 138 / 160
» Towards a Generalized Interaction Scheme for Information Acc...
Sort
View
WWW
2010
ACM
14 years 1 months ago
Reining in the web with content security policy
The last three years have seen a dramatic increase in both awareness and exploitation of Web Application Vulnerabilities. 2008 and 2009 saw dozens of high-profile attacks against...
Sid Stamm, Brandon Sterne, Gervase Markham
CF
2006
ACM
14 years 6 days ago
An efficient cache design for scalable glueless shared-memory multiprocessors
Traditionally, cache coherence in large-scale shared-memory multiprocessors has been ensured by means of a distributed directory structure stored in main memory. In this way, the ...
Alberto Ros, Manuel E. Acacio, José M. Garc...
RV
2007
Springer
151views Hardware» more  RV 2007»
14 years 2 months ago
Instrumentation of Open-Source Software for Intrusion Detection
A significant number of cyber assaults are attempted against open source internet support software written in C, C++, or Java. Examples of these software packages include the Apac...
William R. Mahoney, William L. Sousan
CHI
2008
ACM
14 years 8 months ago
The LilyPad Arduino: using computational textiles to investigate engagement, aesthetics, and diversity in computer science educa
The advent of novel materials (such as conductive fibers) combined with accessible embedded computing platforms have made it possible to re-imagine the landscapes of fabric and el...
Leah Buechley, Michael Eisenberg, Jaime Catchen, A...
BMCBI
2004
98views more  BMCBI 2004»
13 years 8 months ago
STING Millennium Suite: integrated software for extensive analyses of 3d structures of proteins and their complexes
Background: The integration of many aspects of protein/DNA structure analysis is an important requirement for software products in general area of structural bioinformatics. In fa...
Roberto H. Higa, Roberto C. Togawa, Arnaldo J. Mon...