Sciweavers

SAC
2009
ACM
13 years 9 months ago
A taxonomy and adversarial model for attacks against network log anonymization
In recent years, it has become important for researchers, security incident responders and educators to share network logs, and many log anonymization tools and techniques have be...
Justin King, Kiran Lakkaraju, Adam J. Slagell
SAC
2009
ACM
13 years 9 months ago
Incremental board: a grid-based space for visualizing dynamic data sets
In Information Visualization, adding and removing data elements can strongly impact the underlying visual space. We introduce a chess board analogy for displaying (projecting) obj...
Roberto Pinho, Maria Cristina Ferreira de Oliveira...
SAC
2009
ACM
13 years 9 months ago
Impact of function inlining on resource-constrained embedded systems
With the development of computer systems, function inlining schemes were used to reduce execution time while increasing codes. In embedded systems such as wireless sensor nodes, t...
Bongjae Kim, Sangho Yi, Yookun Cho, Jiman Hong
SAC
2009
ACM
13 years 9 months ago
Leveraging OWL for GIS interoperability: rewards and pitfalls
Information systems often require combining datasets available in different formats, and geographical information systems are no exception. While semantic technologies have been u...
Serge Boucher, Esteban Zimányi
SAC
2009
ACM
13 years 11 months ago
Keeping diversity when exploring dynamic environments
This paper presents a new exploration mechanism based on a heterogeneous multi-agent system that combines attractive and repulsive agents. We provide experimental results about th...
Jose Luis Fernandez-Marquez, Josep Lluís Ar...
SAC
2009
ACM
13 years 11 months ago
Open source vs. closed source software: towards measuring security
The increasing availability and deployment of open source software in personal and commercial environments makes open source software highly appealing for hackers, and others who ...
Guido Schryen, Rouven Kadura
SAC
2009
ACM
13 years 11 months ago
Remote software protection by orthogonal client replacement
In a typical client-server scenario, a trusted server provides valuable services to a client, which runs remotely on an untrusted platform. Of the many security vulnerabilities th...
Mariano Ceccato, Paolo Tonella, Mila Dalla Preda, ...
SAC
2009
ACM
13 years 11 months ago
On-line adaptation of sequential mobile processes running concurrently
ÈÖÓ ×× Å Ò Ñ ÒØ ËÝ×Ø Ñ× ´ÈÅË×µ Ö ÒÓÛ Ý× ÑÓÖ Ò ÑÓÖ Ù× × ×ÙÔÔÓÖØ Ò ØÓÓÐ ÓÖ ÓÓÔ Ö Ø Ú ÔÖÓ ×× × Ò Ô ÖÚ × Ú Ò Ð...
Massimiliano de Leoni, Giuseppe De Giacomo, Yves L...
SAC
2009
ACM
13 years 11 months ago
Decomposing port automata
Port automata are an operational model for component connectors in a coordination language such as Reo. They describe which sets of ports can synchronize in each state of the conn...
Christian Koehler, Dave Clarke
SAC
2009
ACM
13 years 11 months ago
A biochemical metaphor for developing eternally adaptive service ecosystems
Mirko Viroli, Matteo Casadei, Sara Montagna, Franc...