Sciweavers

786 search results - page 19 / 158
» A Software System for Secure Computer Aided Exams
Sort
View
SOSP
2007
ACM
15 years 8 months ago
Bouncer: securing software by blocking bad input
Attackers exploit software vulnerabilities to control or crash programs. Bouncer uses existing software instrumentation techniques to detect attacks and it generates filters auto...
Manuel Costa, Miguel Castro, Lidong Zhou, Lintao Z...
TRUST
2009
Springer
15 years 6 months ago
Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture
During many crises, access to sensitive emergency-support information is required to save lives and property. For example, for effective evacuations first responders need the name...
Timothy E. Levin, Jeffrey S. Dwoskin, Ganesha Bhas...
HICSS
2007
IEEE
176views Biometrics» more  HICSS 2007»
15 years 6 months ago
Automated Testing of Generic Computational Science Libraries
The design and maintenance of large computational science systems can be aided greatly by the use of generic computational science libraries. The objectoriented design of software...
Kirk Sayre, Jesse H. Poore
BIRTHDAY
2006
Springer
15 years 3 months ago
Composition by Colimit and Formal Software Development
Abstract. Goguen emphasized long ago that colimits are how to compose systems [7]. This paper corroborates and elaborates Goguen's vision by presenting a variety of situations...
Douglas R. Smith
IJAOSE
2007
82views more  IJAOSE 2007»
14 years 11 months ago
West2East: exploiting WEb Service Technologies to Engineer Agent-based SofTware
This paper describes West2East, a Computer-Aided Agent-Oriented Software Engineering toolkit aimed at supporting the implementation of multiagent systems. West2East exploits langua...
Giovanni Casella, Viviana Mascardi