Sciweavers

4731 search results - page 190 / 947
» Securing Interactive Programs
Sort
View
169
Voted
VEE
2012
ACM
239views Virtualization» more  VEE 2012»
13 years 9 months ago
Facilitating inter-application interactions for OS-level virtualization
OS-level virtualization generates a minimal start-up and run-time overhead on the host OS and thus suits applications that require both good isolation and high efficiency. However...
Zhiyong Shan, Xin Wang 0001, Tzi-cker Chiueh, Xiao...
126
Voted
CCS
2009
ACM
16 years 2 months ago
Lightweight self-protecting JavaScript
This paper introduces a method to control JavaScript execution. The aim is to prevent or modify inappropriate behaviour caused by e.g. malicious injected scripts or poorly designe...
Phu H. Phung, David Sands, Andrey Chudnov
ICFP
2007
ACM
15 years 6 months ago
iTasks: executable specifications of interactive work flow systems for the web
In this paper we introduce the iTask system: a set of combinators to specify work flows in a pure functional language at a very high level of abstraction. Work flow systems are au...
Rinus Plasmeijer, Peter Achten, Pieter W. M. Koopm...
BCSHCI
2008
15 years 3 months ago
The HCI lab at UNC Charlotte
At the Human Computer Interaction Lab (HCILab) at UNC Charlotte, we investigate novel ways for people to interact with computers, and through computers with their environments. Ou...
Celine Latulipe, Heather Richter Lipford
SCAM
2006
IEEE
15 years 8 months ago
Comparative Study of Refactoring Haskell and Erlang Programs
Refactoring is about changing the design of existing code without changing its behaviour, but with the aim of making code easier to understand, modify, or reuse. Taking Haskell an...
Huiqing Li, Simon Thompson