Sciweavers

17 search results - page 2 / 4
» Report: Measuring the Attack Surfaces of Enterprise Software
Sort
View
IWPC
2009
IEEE
14 years 12 days ago
The effectiveness of source code obfuscation: An experimental assessment
Source code obfuscation is a protection mechanism widely used to limit the possibility of malicious reverse engineering or attack activities on a software system. Although several...
Mariano Ceccato, Massimiliano Di Penta, Jasvir Nag...
UIST
2010
ACM
13 years 3 months ago
TeslaTouch: electrovibration for touch surfaces
We present a new technology for enhancing touch interfaces with tactile feedback. The proposed technology is based on the electrovibration principle, does not use any moving parts...
Olivier Bau, Ivan Poupyrev, Ali Israr, Chris Harri...
SIGMOD
2006
ACM
107views Database» more  SIGMOD 2006»
14 years 5 months ago
Documentum ECI self-repairing wrappers: performance analysis
Documentum Enterprise Content Integration (ECI) services is a content integration middleware that provides one-query access to the Intranet and Internet content resources. The ECI...
Boris Chidlovskii, Bruno Roustant, Marc Brette
ICDE
2011
IEEE
222views Database» more  ICDE 2011»
12 years 9 months ago
Dynamic prioritization of database queries
— Enterprise database systems handle a variety of diverse query workloads that are of different importance to the business. For example, periodic reporting queries are usually mi...
Sivaramakrishnan Narayanan, Florian Waas
ICSE
2007
IEEE-ACM
14 years 5 months ago
POLUS: A POwerful Live Updating System
This paper presents POLUS, a software maintenance tool capable of iteratively evolving running software into newer versions. POLUS's primary goal is to increase the dependabi...
Haibo Chen, Jie Yu, Rong Chen, Binyu Zang, Pen-Chu...