Sciweavers

703 search results - page 51 / 141
» On Addressing the Computer Science Crisis
Sort
View
ACMSE
2009
ACM
15 years 4 months ago
Bit vector algorithms enabling high-speed and memory-efficient firewall blacklisting
In a world of increasing Internet connectivity coupled with increasing computer security risks, security conscious network applications implementing blacklisting technology are be...
J. Lane Thames, Randal Abler, David Keeling
ACMSE
2004
ACM
15 years 3 months ago
A framework for trusted instruction execution via basic block signature verification
Most of today’s computers are connected to the Internet or at least to a local network, exposing system vulnerabilities to the potential attackers. One of the attackers’ goals...
Milena Milenkovic, Aleksandar Milenkovic, Emil Jov...
APGV
2007
ACM
15 years 1 months ago
Perception and prediction of simple object interactions
For humans, it is useful to be able to visually detect an object's physical properties. One potentially important source of information is the way the object moves and intera...
Manfred Nusseck, Julien Lagarde, Benoît G. B...
CHI
2009
ACM
15 years 10 months ago
The reign of catz & dogz at CHI 2009
tendees. Extended abstracts ranging from three to four pages in length can be submitted on any relevant topic. Papers will be accepted based on the quality of research and potentia...
Shaun Lawson, Thomas Chesney
PERVASIVE
2007
Springer
15 years 3 months ago
Intrusive and Non-intrusive Evaluation of Ambient Displays
This paper addresses two problems: “What are the appropriate methods for evaluating information systems?” and “How do we measure the impact of ambient information systems?...
Xiaobin Shen, Peter Eades, Seok-Hee Hong, Andrew V...