Sciweavers

632 search results - page 75 / 127
» Visualization Techniques for the Evaluation of Knowledge Sys...
Sort
View
ACSAC
2009
IEEE
15 years 4 months ago
Detecting Software Theft via System Call Based Birthmarks
—Along with the burst of open source projects, software theft (or plagiarism) has become a very serious threat to the healthiness of software industry. Software birthmark, which ...
Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu
SOUPS
2010
ACM
14 years 10 months ago
The impact of social navigation on privacy policy configuration
Social navigation is a promising approach to help users make better privacy and security decisions using community knowledge and expertise. Social navigation has recently been app...
Andrew Besmer, Jason Watson, Heather Richter Lipfo...
DIMVA
2009
14 years 10 months ago
Polymorphing Software by Randomizing Data Structure Layout
Abstract. This paper introduces a new software polymorphism technique that randomizes program data structure layout. This technique will generate different data structure layouts f...
Zhiqiang Lin, Ryan Riley, Dongyan Xu
CHI
2007
ACM
15 years 10 months ago
A motion-based marking menu system
The rapid development of handheld devices is driving the development of new interaction styles. This paper examines one such technique: using hand motions to control a menu system...
Ian Oakley, Junseok Park
ACL
2012
13 years 4 days ago
A Broad-Coverage Normalization System for Social Media Language
Social media language contains huge amount and wide variety of nonstandard tokens, created both intentionally and unintentionally by the users. It is of crucial importance to norm...
Fei Liu, Fuliang Weng, Xiao Jiang