Sciweavers

919 search results - page 104 / 184
» A Practical Model for Measuring Maintainability
Sort
View
126
Voted
SAC
2010
ACM
15 years 10 months ago
Botzilla: detecting the "phoning home" of malicious software
Hosts infected with malicious software, so called malware, are ubiquitous in today’s computer networks. The means whereby malware can infiltrate a network are manifold and rang...
Konrad Rieck, Guido Schwenk, Tobias Limmer, Thorst...
142
Voted
ACSAC
2008
IEEE
15 years 10 months ago
The Role Hierarchy Mining Problem: Discovery of Optimal Role Hierarchies
Role hierarchies are fundamental to the role based access control (RBAC) model. The notion of role hierarchy is a well understood concept that allows senior roles to inherit the p...
Qi Guo, Jaideep Vaidya, Vijayalakshmi Atluri
ICAC
2007
IEEE
15 years 10 months ago
Autonomic Reactive Systems via Online Learning
— Reactive systems are those that maintain an ongoing interaction with their environment at a speed dictated by the latter. Examples of such systems include web servers, network ...
Sanjit A. Seshia
149
Voted
PG
2007
IEEE
15 years 9 months ago
Multilinear Motion Synthesis with Level-of-Detail Controls
Interactive animation systems often use a level-of-detail (LOD) control to reduce the computational cost by eliminating unperceivable details of the scene. Most methods employ a m...
Tomohiko Mukai, Shigeru Kuriyama
122
Voted
VTS
2007
IEEE
95views Hardware» more  VTS 2007»
15 years 9 months ago
Delay Test Quality Evaluation Using Bounded Gate Delays
: Conventionally, path delay tests are derived in a delay-independent manner, which causes most faults to be robustly untestable. Many non-robust tests are found but, in practice, ...
Soumitra Bose, Vishwani D. Agrawal