Sciweavers

1995 search results - page 249 / 399
» Belief in Information Flow
Sort
View
VIS
2009
IEEE
224views Visualization» more  VIS 2009»
16 years 2 months ago
Game Engines for Visualization
Visualization is the transformation of data or information into pictures. The need for visualization has become more apparent as the amount of available information has increased ...
Nick Green, Alex Pang
128
Voted
ISCC
2009
IEEE
250views Communications» more  ISCC 2009»
15 years 7 months ago
Access point-coordinated contention resolution for channel access in wireless LANs
MAHBOOB, AHMED M. Access Point-Coordinated Contention Resolution for Channel Access in Wireless LANs. (Under the direction of Assistant Professor Khaled A. Harfoush.) The most wid...
Ahmed M. Mahboob, Manjunath M. Prabhu, Khaled A. H...
123
Voted
DSN
2007
IEEE
15 years 4 months ago
Augmenting Branch Predictor to Secure Program Execution
Although there are various ways to exploit software vulnerabilities for malicious attacks, the attacks always result in unexpected behavior in program execution, deviating from wh...
Yixin Shi, Gyungho Lee
98
Voted
CCS
2010
ACM
15 years 1 months ago
DIFC programs by automatic instrumentation
Decentralized information flow control (DIFC) operating systems provide applications with mechanisms for enforcing information-flow policies for their data. However, significant o...
William R. Harris, Somesh Jha, Thomas W. Reps
ISW
2010
Springer
14 years 10 months ago
Artificial Malware Immunization Based on Dynamically Assigned Sense of Self
Computer malwares (e.g., botnets, rootkits, spware) are one of the most serious threats to all computers and networks. Most malwares conduct their malicious actions via hijacking t...
Xinyuan Wang, Xuxian Jiang