Now showing items 1-6 of 6
Unearthing Stealthy Program Attacks Buried in Extremely Long Execution Paths
Modern stealthy exploits can achieve attack goals without introducing illegal control flows, e.g., tampering with noncontrol data and waiting for the modified data to propagate and alter the control flow legally. Existing ...
Compassionately Hidden: The Church Telling Local Homeless to “Come to Our House"
(Gamma Theta Upsilon, 2015)
In early 2011, the To Our House (TOH) thermal shelter program opened its doors to homeless men in the New River Valley Area (NRV) of Virginia. The program was a grass roots response to the death of a well-known local ...
Adoption of High-Performance Housing Technologies Among U.S. Homebuilding Firms, 2000 Through 2010
This article describes foundational processes of a larger project examining U.S. home builders’ choices to adopt innovative housing technologies that improve the environmental performance of new single-family homes. Home ...
Recognizing and Confronting State Subjectivity in Asylum Adjudications
(York University, 2015)
United States law charges America’s asylum officers with providing humanitarian protection for refugees while simultaneously securing the nation from external threats. This mandate requires that asylum officers balance ...
Low-Income Mothers' Perceptions of Barriers to Using Farmers Markets: A SNAP-Ed Initiative to Understand Access Points to Local Foods
(Extension Journal, 2015-08)
The study reported here describes a Virginia Family Nutrition Program's target population's perceptions of barriers to using a farmers market to access local foods. Mothers from a rural county photographed their shopping ...
Feed the Future IPM Innovation Lab: A Critical Role in Global Food Security
(Research Information Ltd., 2015-08)
The need: food security The World Food Summit of 1966 defined “food security” as existing “when all people at all times have access to sufficient, safe, and nutritious food to maintain a healthy and active life.” Food ...