Presentation at the ACM CHI 2008 conference by Saul Greenberg and Bill Buxton
Slides from Jon Dron and myself presented at CNIE in Kamloops. Nets , sets, groups and Athabasca Landing
Crash analysis with BitBlaze Charlie Miller Independent Security Evaluators http://securityevaluators.com Juan Caballero (CMU and UC Berkeley) Noah M. Johnson (UC Berkeley)…
ar X iv :1 21 0. 14 56 v1 [ cs .G T] 4 O ct 20 12 Clinching Auctions with Online Supply Gagan Goel Google Inc., New York [email protected] Vahab Mirrokni Google Inc.,…
Crash analysis with BitBlaze Charlie Miller Independent Security Evaluators http://securityevaluators.com Juan Caballero (CMU and UC Berkeley) Noah M. Johnson (UC Berkeley)…
A Study of Android Application Security William Enck, Damien Octeau, Patrick McDaniel, and Swarat Chaudhuri Systems and Internet Infrastructure Security Laboratory Department…
1. Elastic SIEM to detect side-channel attacks in Cloud Infrastructures Pasquale Puzio SecludIT & EURECOM [email protected] Joint work with: Refik Molva (EURECOM)…
1. 1 Фильтрация контента в Интернете. Анализ мировой практики. На протяжении последних двух лет…
1. Call Me MayBe: Understanding Nature and Risks of Sharing Mobile Numbers on Online Social Networks Prachi Jain M.Tech. Thesis Defense 14th November 2013 Committee: Dr.…
1. Friendsters @ Work: Displaying Social Media Streams in the Workplace Joe McCarthy Principal Instigator Nokia Research Center Palo Alto (http: //www.slideshare.net/gumption)…