Sciweavers

228 search results - page 45 / 46
» Usable Mandatory Integrity Protection for Operating Systems
Sort
View
PG
2000
IEEE
13 years 9 months ago
Dynamic PDE Surfaces with Flexible and General Geometric Constraints
PDE surfaces, whose behavior is governed by Partial Differential Equations (PDEs), have demonstrated many modeling advantages in surface blending, free-form surface modeling, and ...
Haixia Du, Hong Qin
COMPSAC
2011
IEEE
12 years 5 months ago
Palimpsests of Time and Place
— This paper discusses ongoing research into the development of an original composition portfolio themed on the concept of palimpsests of time and place. The research involves th...
Jerry Fishenden, Andrew Hugill
POPL
2012
ACM
12 years 27 days ago
Multiple facets for dynamic information flow
JavaScript has become a central technology of the web, but it is also the source of many security problems, including cross-site scripting attacks and malicious advertising code. ...
Thomas H. Austin, Cormac Flanagan
KDD
2002
ACM
179views Data Mining» more  KDD 2002»
14 years 5 months ago
From Data To Insight: The Community Of Multimedia Agents
Multimedia Data Mining requires the ability to automatically analyze and understand the content. The Community of Multimedia Agents project (COMMA) is devoted to creating an open ...
Gang Wei, Valery A. Petrushin, Anatole Gershman
CCS
2009
ACM
14 years 3 days ago
Scalable onion routing with torsk
We introduce Torsk, a structured peer-to-peer low-latency anonymity protocol. Torsk is designed as an interoperable replacement for the relay selection and directory service of th...
Jon McLachlan, Andrew Tran, Nicholas Hopper, Yongd...