We present an experimental study showing that soft memory errors can lead to serious security vulnerabilities in Java and .NET virtual machines, or in any system that relies on ty...
— Due to developing mobile devices and providing services like mobile blogs, people can easily share their thought and experience, at any place and any time. A picture is an impo...
Brain–computer interfaces (BCIs) are becoming more and more popular as an input device for virtual worlds and computer games. Depending on their function, a major drawback is th...
Christoph Groenegress, Clemens Holzner, Christoph ...
This paper addresses new questions around media performance as a result of the rise of centralized content portals such as iTunes or MySpace. We first describe the rise of central...
Jails, Sandboxes and other isolation mechanisms limit the damage from untrusted programs by reducing a process’s privileges to the minimum. Sandboxing is designed to thwart such...