Sciweavers

11 search results - page 1 / 3
» Identifying native applications with high assurance
Sort
View
CODASPY
2012
12 years 2 days ago
Identifying native applications with high assurance
Main stream operating system kernels lack a strong and reliable mechanism for identifying the running processes and binding them to the corresponding executable applications. In t...
Hussain M. J. Almohri, Danfeng (Daphne) Yao, Denni...
COMPSAC
2004
IEEE
13 years 8 months ago
Cooperative Agent Approach to Quality Assurance and Testing Web Software
This paper applies Lehman's theory of software evolution to analyse the characteristics of web-based applications and identifies the essences and incidents that cause difficu...
Hong Zhu
DBSEC
2006
125views Database» more  DBSEC 2006»
13 years 5 months ago
Aspect-Oriented Risk Driven Development of Secure Applications
Abstract. Security breaches seldom occur because of faulty security mechanisms. Often times, security mechanisms are incorrectly incorporated in an application which allows them to...
Geri Georg, Siv Hilde Houmb, Indrakshi Ray
DAGM
2005
Springer
13 years 10 months ago
Vision-Based 3D Object Localization Using Probabilistic Models of Appearance
The ability to accurately localize objects in an observed scene is regarded as an important precondition for many practical applications including automatic manufacturing, quality ...
Christian Plagemann, Thomas Müller, Wolfram B...
BMCBI
2008
130views more  BMCBI 2008»
13 years 4 months ago
An enhanced partial order curve comparison algorithm and its application to analyzing protein folding trajectories
Background: Understanding how proteins fold is essential to our quest in discovering how life works at the molecular level. Current computation power enables researchers to produc...
Hong Sun, Hakan Ferhatosmanoglu, Motonori Ota, Yus...