Sciweavers

154 search results - page 29 / 31
» Towards More Professional Information Systems Development: I...
Sort
View
ASPLOS
2006
ACM
13 years 11 months ago
Temporal search: detecting hidden malware timebombs with virtual machines
Worms, viruses, and other malware can be ticking bombs counting down to a specific time, when they might, for example, delete files or download new instructions from a public we...
Jedidiah R. Crandall, Gary Wassermann, Daniela A. ...
IJEIS
2010
80views more  IJEIS 2010»
13 years 3 months ago
Semantics for Accurate Conflict Detection in SMoVer: Specification, Detection and Presentation by Example
In collaborative software development the utilization of Version Control Systems (VCSs) is a must. For this, a multitude of pessimistic as well as optimistic VCSs for model artifa...
Kerstin Altmanninger, Wieland Schwinger, Gabriele ...
CHI
2011
ACM
12 years 9 months ago
Interactive generator: a self-powered haptic feedback device
We present Interactive Generator (InGen), a self-powered wireless rotary input device capable of generating haptic or force feedback without the need for any external power source...
Akash Badshah, Sidhant Gupta, Gabe Cohn, Nicolas V...
GECCO
2009
Springer
138views Optimization» more  GECCO 2009»
14 years 10 days ago
IMAD: in-execution malware analysis and detection
The sophistication of computer malware is becoming a serious threat to the information technology infrastructure, which is the backbone of modern e-commerce systems. We, therefore...
Syed Bilal Mehdi, Ajay Kumar Tanwani, Muddassar Fa...
BMCBI
2006
118views more  BMCBI 2006»
13 years 5 months ago
A graphical model approach to automated classification of protein subcellular location patterns in multi-cell images
Background: Knowledge of the subcellular location of a protein is critical to understanding how that protein works in a cell. This location is frequently determined by the interpr...
Shann-Ching Chen, Robert F. Murphy