Sciweavers

2429 search results - page 224 / 486
» Using Aspects to Design a Secure System
Sort
View
130
Voted
SP
2000
IEEE
134views Security Privacy» more  SP 2000»
15 years 8 months ago
Fang: A Firewall Analysis Engine
Today, even a moderately sized corporate intranet contains multiple firewalls and routers, which are all used to enforce various aspects of the global corporate security policy. ...
Alain J. Mayer, Avishai Wool, Elisha Ziskind
SP
1998
IEEE
106views Security Privacy» more  SP 1998»
15 years 7 months ago
Understanding Java Stack Inspection
Current implementations of Java make security decisions by searching the runtime call stack. These systems have attractive security properties, but they have been criticized as be...
Dan S. Wallach, Edward W. Felten
109
Voted
ECSCW
1993
15 years 4 months ago
Culture and Control in a Media Space
: Media spaces integrate audio, video and computer networking technology in order to provide a rich communicative environment for collaboration. The connectivity which they provide...
Paul Dourish
ECIR
2006
Springer
15 years 5 months ago
Can a Workspace Help to Overcome the Query Formulation Problem in Image Retrieval?
We have proposed a novel image retrieval system that incorporates a workspace where users can organise their search results. A task-oriented and usercentred experiment has been dev...
Jana Urban, Joemon M. Jose
121
Voted
OOPSLA
2004
Springer
15 years 9 months ago
Bottleneck analysis in java applications using hardware performance monitors
This poster presents MonitorMethod which helps Java programmers gain insight in the behavior of their applications. MonitorMethod instruments the Java application and relates hard...
Dries Buytaert, Andy Georges, Lieven Eeckhout, Koe...