Now showing items 55-57 of 807

    • Sound and Complete Runtime Security Monitor for Application Software 

      Khan, M. Taimoor; Serpanos, Dimitrios; Shrobe, Howard (2016-12-15)
      We present a run-time security monitor that detects both known and unknown cyber attacks by checking that the run-time behavior of the application is consistent with the expected behavior modeled by an application ...
    • Oort: User-Centric Cloud Storage with Global Queries 

      Chajed, Tej; Gjengset, Jon; Kaashoek, M. Frans; Mickens, James; Morris, Robert; e.a. (2016-12-08)
      In principle, the web should provide the perfect stage for user-generated content, allowing users to share their data seamlessly with other users across services and applications. In practice, the web fragments a user's ...
    • Data and Code for "Automatic Identification of Narrative Diegesis and Point of View" 

      Eisenberg, Joshua D.; Finlayson, Mark A. (2016-11-09)
      This archive contains the code and data for the workshop article "Automatic Identification of Narrative Diegesis and Point of View," published in 2016 in the 2nd Workshop for Computing News Storylines (CNewsStory 2016), ...