Sciweavers

1818 search results - page 185 / 364
» How users use access control
Sort
View
SP
2003
IEEE
15 years 10 months ago
Using Memory Errors to Attack a Virtual Machine
We present an experimental study showing that soft memory errors can lead to serious security vulnerabilities in Java and .NET virtual machines, or in any system that relies on ty...
Sudhakar Govindavajhala, Andrew W. Appel
CEC
2010
IEEE
15 years 3 months ago
Mobile interface for adaptive image refinement using interactive evolutionary computing
— Due to developing mobile devices and providing services like mobile blogs, people can easily share their thought and experience, at any place and any time. A picture is an impo...
Tae-min Jung, Youngseol Lee, Sung-Bae Cho
138
Voted
PRESENCE
2010
84views more  PRESENCE 2010»
15 years 3 months ago
Effects of P300-Based BCI Use on Reported Presence in a Virtual Environment
Brain–computer interfaces (BCIs) are becoming more and more popular as an input device for virtual worlds and computer games. Depending on their function, a major drawback is th...
Christoph Groenegress, Clemens Holzner, Christoph ...
ELPUB
2007
ACM
15 years 8 months ago
Centralized Content Portals: iTunes and the Publishing Industry
This paper addresses new questions around media performance as a result of the rise of centralized content portals such as iTunes or MySpace. We first describe the rise of central...
Matthijs Leendertse, Leo Pennings
ACSAC
2007
IEEE
15 years 11 months ago
Quarantining Untrusted Entities: Dynamic Sandboxing Using LEAP
Jails, Sandboxes and other isolation mechanisms limit the damage from untrusted programs by reducing a process’s privileges to the minimum. Sandboxing is designed to thwart such...
Manigandan Radhakrishnan, Jon A. Solworth