Sciweavers

92 search results - page 17 / 19
» Is Context-Aware Computing Taking Control away from the User
Sort
View
NPAR
2006
ACM
14 years 7 days ago
Real-time pencil rendering
ROJECTPROJECT ABSTRACTABSTRACTABSTRACT After achieving real-time photorealistic rendering, the computer graphics community is beginning to turn its attention to non-photorealistic ...
Hyunjun Lee, Sungtae Kwon, Seungyong Lee
PRESENCE
2002
185views more  PRESENCE 2002»
13 years 6 months ago
EyeTap Devices for Augmented, Deliberately Diminished, or Otherwise Altered Visual Perception of Rigid Planar Patches of Real-Wo
Diminished reality is as important as augmented reality, and both are possible with a device called the Reality Mediator. Over the past two decades, we have designed, built, worn,...
Steve Mann, James Fung
ICSOC
2005
Springer
13 years 11 months ago
Trust-Based Secure Workflow Path Construction
—Service-oriented computing promotes collaboration by defining the standards layer that allows compatibility between disparate domains. Workflows, by taking advantage of the serv...
Mine Altunay, Douglas E. Brown, Gregory T. Byrd, R...
IJDE
2006
95views more  IJDE 2006»
13 years 6 months ago
Exploiting the Rootkit Paradox with Windows Memory Analysis
Rootkits are malicious programs that silently subvert an operating system to hide an intruder's activities. Although there are a number of tools designed to detect rootkits, ...
Jesse D. Kornblum
ACSAC
2006
IEEE
14 years 10 days ago
How to Automatically and Accurately Sandbox Microsoft IIS
Comparing the system call sequence of a network application against a sandboxing policy is a popular approach to detecting control-hijacking attack, in which the attacker exploits...
Wei Li, Lap-Chung Lam, Tzi-cker Chiueh