Sciweavers

5970 search results - page 1057 / 1194
» Management Information Model Engineering
Sort
View
WWW
2003
ACM
16 years 4 months ago
SHOCK: communicating with computational messages and automatic private profiles
A computationally enhanced message contains some embedded programmatic components that are interpreted and executed automatically upon receipt. Unlike ordinary text email or insta...
Rajan M. Lukose, Eytan Adar, Joshua R. Tyler, Caes...
POPL
2007
ACM
16 years 4 months ago
Dynamic heap type inference for program understanding and debugging
C programs can be difficult to debug due to lax type enforcement and low-level access to memory. We present a dynamic analysis for C that checks heap snapshots for consistency wit...
Ben Liblit, Chloë W. Schulze, Marina Polishch...
ISW
2009
Springer
15 years 10 months ago
Automated Spyware Collection and Analysis
Various online studies on the prevalence of spyware attest overwhelming numbers (up to 80%) of infected home computers. However, the term spyware is ambiguous and can refer to anyt...
Andreas Stamminger, Christopher Kruegel, Giovanni ...
LOCA
2009
Springer
15 years 10 months ago
LOCK: A Highly Accurate, Easy-to-Use Location-Based Access Control System
With proliferation of ubiquitous computing, digital access is facing an increasing risk since unauthorized client located at any place may intrude a local server. Location Based Ac...
Yongcai Wang, Junhui Zhao, Toshikazu Fukushima
ICMI
2007
Springer
135views Biometrics» more  ICMI 2007»
15 years 10 months ago
Natural multimodal dialogue systems: a configurable dialogue and presentation strategies component
In the context of natural multimodal dialogue systems, we address the challenging issue of the definition of cooperative answers in an appropriate multimodal form. Highlighting th...
Meriam Horchani, Benjamin Caron, Laurence Nigay, F...
« Prev « First page 1057 / 1194 Last » Next »