Sciweavers

7352 search results - page 1416 / 1471
» Universal access to information
Sort
View
VIZSEC
2005
Springer
14 years 2 months ago
Multiple Coordinated Views for Network Attack Graphs
While efficient graph-based representations have been developed for modeling combinations of low-level network attacks, relatively little attention has been paid to effective tech...
Steven Noel, Michael Jacobs, Pramod Kalapa, Sushil...
ASSETS
2004
ACM
14 years 2 months ago
Text entry from power wheelchairs: edgewrite for joysticks and touchpads
Power wheelchair joysticks have been used to control a mouse cursor on desktop computers, but they offer no integrated text entry solution, confining users to point-and-click or p...
Jacob O. Wobbrock, Brad A. Myers, Htet Htet Aung, ...
CF
2004
ACM
14 years 2 months ago
Repairing return address stack for buffer overflow protection
Although many defense mechanisms against buffer overflow attacks have been proposed, buffer overflow vulnerability in software is still one of the most prevalent vulnerabilities e...
Yong-Joon Park, Gyungho Lee
MM
2004
ACM
170views Multimedia» more  MM 2004»
14 years 2 months ago
Effective automatic image annotation via a coherent language model and active learning
Image annotations allow users to access a large image database with textual queries. There have been several studies on automatic image annotation utilizing machine learning techn...
Rong Jin, Joyce Y. Chai, Luo Si
MOBICOM
2004
ACM
14 years 2 months ago
SPAWN: a swarming protocol for vehicular ad-hoc wireless networks
Future vehicular networks are expected to deploy shortrange communication technology for inter-vehicle communication. In addition to vehicle-to-vehicle communication, users will b...
Shirshanka Das, Alok Nandan, Giovanni Pau
« Prev « First page 1416 / 1471 Last » Next »