GEGICK, MICHAEL CHARLES. Predicting Attack-prone Components with Source Code Static Analyzers. (Under the direction of Laurie Williams). No single vulnerability detection techniqu...
Location awareness is the key capability of mobilecomputingapplications. Despitehighdemand, indoor location technologies have not become truly ubiquitous mainly due to their requir...
This paper details a true and striking paradigm shift: the use of E-Prime for (at least) user-centered security, organizational/enterprise security policies and informal security ...
The continuous changes in customer requirements as well as the ever-increasing market-driven demand of innovation makes automotive software projects success strongly dependent on t...
Fabrizio Fabbrini, Mario Fusani, Giuseppe Lami, Ed...
This paper presents joint work by the California Institute of Technology’s Jet Propulsion Laboratory and the University of California at Davis (UC Davis) sponsored by the Nation...