Sciweavers

169 search results - page 4 / 34
» Malicious interface design: exploiting the user
Sort
View
DATE
2004
IEEE
152views Hardware» more  DATE 2004»
13 years 9 months ago
A Design Methodology for the Exploitation of High Level Communication Synthesis
In this paper we analyse some methodological concerns that have to be faced in a design flow which contains automatic synthesis phases from high-level, system descriptions. In par...
Francesco Bruschi, Massimo Bombana
IJDE
2006
95views more  IJDE 2006»
13 years 6 months ago
Exploiting the Rootkit Paradox with Windows Memory Analysis
Rootkits are malicious programs that silently subvert an operating system to hide an intruder's activities. Although there are a number of tools designed to detect rootkits, ...
Jesse D. Kornblum
IUI
2010
ACM
14 years 2 months ago
The RelFinder user interface: interactive exploration of relationships between objects of interest
Being aware of the relationships that exist between objects of interest is crucial in many situations. The RelFinder user interface helps to get an overview: Even large amounts of...
Steffen Lohmann, Philipp Heim, Timo Stegemann, J&u...
EJC
2000
13 years 7 months ago
User Interface Modelling with UML
Abstract. The Unified Modeling Language (UML) is a natural candidate for user interface (UI) modelling since it is the standard notation for object oriented modelling of applicatio...
Paulo Pinheiro da Silva, Norman W. Paton
DAC
2005
ACM
14 years 7 months ago
Hardware speech recognition for user interfaces in low cost, low power devices
We propose a system architecture for real-time hardware speech recognition on low-cost, power-constrained devices. The system is intended to support real-time speech-based user in...
Sergiu Nedevschi, Rabin K. Patra, Eric A. Brewer