Sciweavers

1444 search results - page 99 / 289
» The end of users
Sort
View
USS
2010
14 years 7 months ago
AdJail: Practical Enforcement of Confidentiality and Integrity Policies on Web Advertisements
Web publishers frequently integrate third-party advertisements into web pages that also contain sensitive publisher data and end-user personal data. This practice exposes sensitiv...
Mike Ter Louw, Karthik Thotta Ganesh, V. N. Venkat...
ISSA
2008
14 years 11 months ago
Bloom's Taxonomy for Information Security Education
The importance of educating organizational end users about their roles and responsibilities towards information security is widely acknowledged. However, many current user educati...
Johan Van Niekerk, Rossouw von Solms
MICRO
2008
IEEE
136views Hardware» more  MICRO 2008»
15 years 4 months ago
Power to the people: Leveraging human physiological traits to control microprocessor frequency
Any architectural optimization aims at satisfying the end user. However, modern architectures execute with little to no knowledge about the individual user. If architectures could...
Alex Shye, Yan Pan, Benjamin Scholbrock, J. Scott ...

Book
340views
16 years 5 months ago
Essentials of the Java Programming Language, Part 1
"If you are new to programming in the Java language, have some experience with other languages, and are familiar with things like displaying text or graphics or performing sim...
By Monica Pawlan
WWW
2001
ACM
15 years 10 months ago
Using proxy cache relocation to accelerate Web browsing in wireless/mobile communications
Mobile computing is considered of major importance to the computing industry for the forthcoming years due to the progress in the wireless communications area. A proxy-based archi...
Stathes Hadjiefthymiades, Lazaros F. Merakos