Sciweavers

21876 search results - page 4203 / 4376
» Computer game-flow design
Sort
View
123
Voted
ICWS
2009
IEEE
16 years 24 days ago
Reiki: Serviceability Architecture and Approach for Reduction and Management of Product Service Incidents
: Ā© Reiki: Serviceability Architecture and Approach for Reduction and Management of Product Service Incidents Chris Connelly, Brian Cox, Tim Forell, Rui Liu, Dejan Milojicic, Alan...
Chris Connelly, Brian Cox, Tim Forell, Rui Liu, De...
EUROSYS
2010
ACM
16 years 22 days ago
Reverse Engineering of Binary Device Drivers with RevNIC
This paper presents a technique that helps automate the reverse engineering of device drivers. It takes a closed-source binary driver, automatically reverse engineers the driverā€...
Vitaly Chipounov, George Candea
116
Voted
EUROSYS
2009
ACM
16 years 22 days ago
Privacy-preserving browser-side scripting with BFlow
Some web sites provide interactive extensions using browser scripts, often without inspecting the scripts to verify that they are benign and bug-free. Others handle users’ conļ¬...
Alexander Yip, Neha Narula, Maxwell N. Krohn, Robe...
EUROSYS
2008
ACM
16 years 22 days ago
Flicker: an execution infrastructure for tcb minimization
We present Flicker, an infrastructure for executing securitysensitive code in complete isolation while trusting as few as 250 lines of additional code. Flicker can also provide me...
Jonathan M. McCune, Bryan Parno, Adrian Perrig, Mi...
124
Voted
EUROSYS
2008
ACM
16 years 22 days ago
Application-level isolation and recovery with solitude
When computer systems are compromised by an attack, it is difficult to determine the precise extent of the damage caused by the attack because the state changes made by an attack...
Shvetank Jain, Fareha Shafique, Vladan Djeric, Ash...
« Prev « First page 4203 / 4376 Last » Next »