Sciweavers

1454 search results - page 222 / 291
» Modeling User Affect from Causes and Effects
Sort
View
HPCA
2006
IEEE
15 years 10 months ago
InfoShield: a security architecture for protecting information usage in memory
Cyber theft is a serious threat to Internet security. It is one of the major security concerns by both network service providers and Internet users. Though sensitive information c...
Guofei Gu, Hsien-Hsin S. Lee, Joshua B. Fryman, Ju...
MHCI
2009
Springer
15 years 4 months ago
Fixed in time and "time in motion": mobility of vision through a SenseCam lens
SenseCam is an automatic wearable camera, often seen as a tool for the creation of digital memories. In this paper, we report findings from a field trial in which SenseCams were w...
Siân E. Lindley, Richard H. R. Harper, David...
ISORC
2002
IEEE
15 years 2 months ago
End-to-End Latency of a Fault-Tolerant CORBA Infrastructure
This paper presents measured probability density functions (pdfs) for the end-to-end latency of two-way remote method invocations from a CORBA client to a replicated CORBA server ...
Wenbing Zhao, Louise E. Moser, P. M. Melliar-Smith
SIGSOFT
1996
ACM
15 years 2 months ago
Tool Support for Planning the Restructuring of Data Abstractions in Large Systems
Abstractions in Large Systems William G. Griswold, Member, IEEE, Morison I. Chen, Robert W. Bowdidge, Jenny L. Cabaniss, Van B. Nguyen, and J. David Morgenthaler Restructuring soft...
William G. Griswold, Morison I. Chen, Robert W. Bo...
ASPLOS
2008
ACM
14 years 12 months ago
Archipelago: trading address space for reliability and security
Memory errors are a notorious source of security vulnerabilities that can lead to service interruptions, information leakage and unauthorized access. Because such errors are also ...
Vitaliy B. Lvin, Gene Novark, Emery D. Berger, Ben...