Sciweavers

163 search results - page 20 / 33
» JavaScript Instrumentation in Practice
Sort
View
SP
2008
IEEE
15 years 8 months ago
Preventing Memory Error Exploits with WIT
Attacks often exploit memory errors to gain control over the execution of vulnerable programs. These attacks remain a serious problem despite previous research on techniques to pr...
Periklis Akritidis, Cristian Cadar, Costin Raiciu,...
100
Voted
HICSS
1999
IEEE
137views Biometrics» more  HICSS 1999»
15 years 6 months ago
A Methodology for Evaluating and Selecting Data Mining Software
As data mining evolves and matures more and more businesses are incorporating this technology into their business practices. However, currently data mining and decision support so...
Ken W. Collier, Donald Sautter, Curt Marjaniemi, B...
126
Voted
ACMDIS
2008
ACM
15 years 3 months ago
Sharing digital photographs in the home through physical mementos, souvenirs, and keepsakes
People now easily share digital photos outside the home via web publishing and gift-giving. Yet within the home, digital photos are hard to access and lack the physical affordance...
Michael Nunes, Saul Greenberg, Carman Neustaedter
207
Voted
ESWA
2011
428views Database» more  ESWA 2011»
14 years 8 months ago
Formally analysing the concepts of domestic violence
The types of police inquiries performed these days are incredibly diverse. Often data processing architectures are not suited to cope with this diversity since most of the case dat...
Jonas Poelmans, Paul Elzinga, Stijn Viaene, Guido ...
115
Voted
HICSS
2011
IEEE
208views Biometrics» more  HICSS 2011»
14 years 5 months ago
An Experimental Study of Financial Portfolio Selection with Visual Analytics for Decision Support
We investigate the decision process as applied to the practical task of choosing a financial portfolio. We developed PortfolioCompare, an interactive visual analytic decision sup...
Anya Savikhin, Hon Cheong Lam, Brian D. Fisher, Da...