Sciweavers

COMPSAC
2009
IEEE
13 years 8 months ago
On a Classification Approach for SOA Vulnerabilities
Abstract--Vulnerabilities in operating systems and web applications have been and are being put into various classifications, leading to a better understanding of their causes and ...
Lutz Lowis, Rafael Accorsi
COMPSAC
2009
IEEE
13 years 8 months ago
Tamper Resistance for Software Defined Radio Software
The security of software defined radio (SDR) software is essential to the trustworthiness of the overall radio system. When designing and developing security solutions for SDR sof...
Shucai Xiao, Jung-Min Park, Yanzhu Ye
COMPSAC
2009
IEEE
13 years 8 months ago
Hot Set Identification for Social Network Applications
Several operations of Web-based applications are optimized with respect to the set of resources that will receive the majority of requests in the near future, namely the hot set. U...
Claudia Canali, Michele Colajanni, Riccardo Lancel...
COMPSAC
2009
IEEE
13 years 8 months ago
Leveraging Social Contacts for Message Confidentiality in Delay Tolerant Networks
Delay and disruption tolerant networks (DTNs) can bring much-needed networking capabilities to developing countries and rural areas. DTN features such as high node mobility and in...
Karim M. El Defrawy, John Solis, Gene Tsudik
COMPSAC
2009
IEEE
13 years 9 months ago
Middleware for RFID Systems: An Overview
RFID-Based Systems have started to play a significant role in the automation of many business processes such as ERP systems and object tracking. Several efforts were made within t...
Jameela Al-Jaroodi, Junaid Aziz, Nader Mohamed
COMPSAC
2009
IEEE
13 years 9 months ago
Towards a Next-Generation Matrix Library for Java
Matrices are essential in many fields of computer science, especially when large amounts of data must be handled efficiently. Despite this demand for matrix software, we were una...
Holger Arndt, Markus Bundschus, Andreas Naegele
COMPSAC
2009
IEEE
13 years 9 months ago
Modeling and Predicting Software Failure Costs
—For software, the costs of failures are not clearly understood. Often, these costs disappear in the costs of testing, the general developments costs, or the operating expenses. ...
Michael Grottke, Christian A. Graf
COMPSAC
2009
IEEE
13 years 9 months ago
How Well Do Test Case Prioritization Techniques Support Statistical Fault Localization
—In continuous integration, a tight integration of test case prioritization techniques and fault-localization techniques may both expose failures faster and locate faults more ef...
Bo Jiang, Zhenyu Zhang, T. H. Tse, Tsong Yueh Chen