Sciweavers

2613 search results - page 447 / 523
» Active Software Artifacts
Sort
View
IMC
2006
ACM
15 years 5 months ago
Finding diversity in remote code injection exploits
Remote code injection exploits inflict a significant societal cost, and an active underground economy has grown up around these continually evolving attacks. We present a method...
Justin Ma, John Dunagan, Helen J. Wang, Stefan Sav...
ISSTA
2006
ACM
15 years 5 months ago
Towards regression test selection for AspectJ programs
Regression testing aims at showing that code has not been adversely affected by modification activities during maintenance. Regression test selection techniques reuse tests from...
Jianjun Zhao, Tao Xie, Nan Li
NSPW
2006
ACM
15 years 5 months ago
Dark application communities
In considering new security paradigms, it is often worthwhile to anticipate the direction and nature of future attack paradigms. We identify a class of attacks based on the idea o...
Michael E. Locasto, Angelos Stavrou, Angelos D. Ke...
UIST
2006
ACM
15 years 5 months ago
CINCH: a cooperatively designed marking interface for 3D pathway selection
To disentangle and analyze neural pathways estimated from magnetic resonance imaging data, scientists need an interface to select 3D pathways. Broad adoption of such an interface ...
David Akers
UIST
2006
ACM
15 years 5 months ago
Using a low-cost electroencephalograph for task classification in HCI research
Modern brain sensing technologies provide a variety of methods for detecting specific forms of brain activity. In this paper, we present an initial step in exploring how these tec...
Johnny Chung Lee, Desney S. Tan