Sciweavers

38 search results - page 7 / 8
» Operating System Interface Obfuscation and the Revealing of ...
Sort
View
ASPLOS
2008
ACM
13 years 7 months ago
The mapping collector: virtual memory support for generational, parallel, and concurrent compaction
Parallel and concurrent garbage collectors are increasingly employed by managed runtime environments (MREs) to maintain scalability, as multi-core architectures and multi-threaded...
Michal Wegiel, Chandra Krintz
ICSM
2003
IEEE
13 years 11 months ago
DART: A Framework for Regression Testing "Nightly/daily Builds" of GUI Applications
“Nightly/daily building and smoke testing” have become widespread since they often reveal bugs early in the software development process. During these builds, software is comp...
Atif M. Memon, Ishan Banerjee, Nada Hashmi, Adithy...
ICST
2010
IEEE
13 years 4 months ago
Fault Detection Likelihood of Test Sequence Length
— Testing of graphical user interfaces is important due to its potential to reveal faults in operation and performance of the system under consideration. Most existing test appro...
Fevzi Belli, Michael Linschulte, Christof J. Budni...
CHI
2006
ACM
14 years 6 months ago
The springboard: multiple modes in one spring-loaded control
Modes allow a few inputs to invoke many operations, yet if a user misclassifies or forgets the state of a system, modes can result in errors. Spring-loaded modes (quasimodes) main...
Edward Cutrell, François Guimbretièr...
SP
2000
IEEE
117views Security Privacy» more  SP 2000»
13 years 10 months ago
Practical Techniques for Searches on Encrypted Data
It is desirable to store data on data storage servers such as mail servers and file servers in encrypted form to reduce security and privacy risks. But this usually implies that ...
Dawn Xiaodong Song, David Wagner, Adrian Perrig