Sciweavers

6768 search results - page 1132 / 1354
» Developing Applications Using Model-Driven Design Environmen...
Sort
View
SP
2002
IEEE
110views Security Privacy» more  SP 2002»
15 years 3 months ago
Optical Time-Domain Eavesdropping Risks of CRT Displays
A new eavesdropping technique can be used to read cathode-ray tube (CRT) displays at a distance. The intensity of the light emitted by a raster-scan screen as a function of time c...
Markus G. Kuhn
ACSAC
2010
IEEE
15 years 2 months ago
Paranoid Android: versatile protection for smartphones
Smartphone usage has been continuously increasing in recent years. Moreover, smartphones are often used for privacysensitive tasks, becoming highly valuable targets for attackers....
Georgios Portokalidis, Philip Homburg, Kostas Anag...
132
Voted
GROUP
2009
ACM
15 years 1 months ago
Social performances: understanding the motivations for online participatory behavior
"Open contribution systems" (OCS) are online applications that encourage users to contribute and share content in a "public" and open manner. While these syste...
Jude Yew
136
Voted
PC
2010
100views Management» more  PC 2010»
14 years 10 months ago
Analysis of the solution phase of a parallel multifrontal approach
We study the forward and backward substitution phases of a sparse multifrontal factorization. These phases are often neglected in papers on sparse direct factorization but, in man...
Patrick Amestoy, Iain S. Duff, Abdou Guermouche, T...
POPL
2010
ACM
16 years 1 months ago
Semantics and Algorithms for Data-dependent Grammars
Traditional parser generation technologies are incapable of handling the demands of modern programmers. In this paper, we present the design and theory of a new parsing engine, YA...
Yitzhak Mandelbaum, Trevor Jim, David Walker
« Prev « First page 1132 / 1354 Last » Next »