Sciweavers

624 search results - page 95 / 125
» Application of Lightweight Formal Methods to Software Securi...
Sort
View
IUI
2005
ACM
15 years 5 months ago
Designing interfaces for guided collection of knowledge about everyday objects from volunteers
A new generation of intelligent applications can be enabled by broad-coverage knowledge repositories about everyday objects. We distill lessons in design of intelligent user inter...
Timothy Chklovski
INTERACTION
2009
ACM
15 years 4 months ago
RoboEarth: connecting robots worldwide
In this paper, we present the core concept and the benefits of an approach called RoboEarth which will be highly beneficial for future robotic applications in science and industry...
Oliver Zweigle, René van de Molengraft, Raf...
WISTP
2010
Springer
14 years 9 months ago
Efficient and Effective Buffer Overflow Protection on ARM Processors
Although many countermeasures have been developed for desktop and server environments, buffer overflows still pose a big threat. The same approach can be used to target mobile devi...
Raoul Strackx, Yves Younan, Pieter Philippaerts, F...
KDD
2004
ACM
330views Data Mining» more  KDD 2004»
16 years 6 days ago
Learning to detect malicious executables in the wild
In this paper, we describe the development of a fielded application for detecting malicious executables in the wild. We gathered 1971 benign and 1651 malicious executables and enc...
Jeremy Z. Kolter, Marcus A. Maloof
ISSA
2004
15 years 1 months ago
A Logic-Based Access Control Approach For Web Services
Web Services technology enables organisations to exploit software as a service. Services are accessed by method invocations. Method interfaces are described and published, and may...
Marijke Coetzee