Sciweavers

7124 search results - page 1112 / 1425
» Programming Languages and Operating Systems
Sort
View
SP
2009
IEEE
129views Security Privacy» more  SP 2009»
15 years 11 months ago
CLAMP: Practical Prevention of Large-Scale Data Leaks
Providing online access to sensitive data makes web servers lucrative targets for attackers. A compromise of any of the web server’s scripts, applications, or operating system c...
Bryan Parno, Jonathan M. McCune, Dan Wendlandt, Da...
ISSTA
1989
ACM
15 years 8 months ago
The Logic of Propagation in the Inscape Environment
The Inscape Environment research project addresses issues in supporting the development of large systems by large numbers of programmers. One aspect of this research is the ‘‘...
D. Perry
BMVC
2002
15 years 6 months ago
Real-time gesture recognition using deterministic boosting
A gesture recognition system which can reliably recognize single-hand gestures in real time on a 600Mhz notebook computer is described. The system has a vocabulary of 46 gestures ...
Raymond Lockton, Andrew W. Fitzgibbon
ECMDAFA
2010
Springer
138views Hardware» more  ECMDAFA 2010»
15 years 2 months ago
A UML 2.0 Profile to Model Block Cipher Algorithms
Abstract. Current mobile digital communication systems must implement rigorous operations to guarantee high levels of confidentiality and integrity during transmission of critical ...
Tomás Balderas-Contreras, Gustavo Rodr&iacu...
DSN
2005
IEEE
15 years 10 months ago
Detecting Stealth Software with Strider GhostBuster
Stealth malware programs that silently infect enterprise and consumer machines are becoming a major threat to the future of the Internet [XZ04]. Resource hiding is a powerful stea...
Yi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, C...
« Prev « First page 1112 / 1425 Last » Next »