Sciweavers

3979 search results - page 730 / 796
» Wild control operators
Sort
View
SOUPS
2009
ACM
15 years 4 months ago
Revealing hidden context: improving mental models of personal firewall users
The Windows Vista personal firewall provides its diverse users with a basic interface that hides many operational details. However, concealing the impact of network context on th...
Fahimeh Raja, Kirstie Hawkey, Konstantin Beznosov
71
Voted
ACSAC
2008
IEEE
15 years 4 months ago
New Side Channels Targeted at Passwords
Side channels are typically viewed as attacks that leak cryptographic keys during cryptographic algorithm processing, by observation of system side effects. In this paper, we pres...
Albert Tannous, Jonathan T. Trostle, Mohamed Hassa...
ICIP
2008
IEEE
15 years 4 months ago
Hardware-friendly descreening
Conventional electrophotographic printers tend to produce Moir´e artifacts when used for printing images scanned from printed material such as books and magazines. We propose a n...
Hasib Siddiqui, Mireille Boutin, Charles A. Bouman
ICMCS
2008
IEEE
165views Multimedia» more  ICMCS 2008»
15 years 4 months ago
Hyperacoustic instruments: Computer-controlled instruments that are not electrophones
This paper describes a musical instrument consisting of a physical process that acoustically generates sound from the material world (i.e. sound derived from matter such as solid,...
Steve Mann, Ryan E. Janzen, Raymond Lo
ICSM
2008
IEEE
15 years 4 months ago
Understanding the rationale for updating a function's comment
Up-to-date comments are critical for the successful evolution of a software application. When modifying a function, developers may update the comment associated with the function ...
Haroon Malik, Istehad Chowdhury, Hsiao-Ming Tsou, ...