Sciweavers

141 search results - page 23 / 29
» Application of Vulnerability Discovery Models to Major Opera...
Sort
View
86
Voted
CAISE
2009
Springer
15 years 4 months ago
TomTom for Business Process Management (TomTom4BPM)
Navigation systems have proven to be quite useful for many drivers. People increasingly rely on the devices of TomTom and other vendors and find it useful to get directions to go ...
Wil M. P. van der Aalst
98
Voted
ICEGOV
2007
ACM
15 years 1 months ago
Formal threat descriptions for enhancing governmental risk assessment
Compared to the last decades, we have recently seen more and more governmental applications which are provided via the Internet directly to the citizens. Due to the long history o...
Andreas Ekelhart, Stefan Fenz, Thomas Neubauer, Ed...
97
Voted
CSMR
2004
IEEE
15 years 1 months ago
Supporting Architectural Restructuring by Analyzing Feature Models
In order to lower the risk, reengineering projects aim at high reuse rates. Therefore, tasks like architectural restructuring have to be performed in a way that developed new syst...
Ilian Pashov, Matthias Riebisch, Ilka Philippow
EUROSYS
2008
ACM
15 years 6 months ago
Samurai: protecting critical data in unsafe languages
Programs written in type-unsafe languages such as C and C++ incur costly memory errors that result in corrupted data structures, program crashes, and incorrect results. We present...
Karthik Pattabiraman, Vinod Grover, Benjamin G. Zo...
86
Voted
EMSOFT
2007
Springer
15 years 3 months ago
Exploiting non-volatile RAM to enhance flash file system performance
Non-volatile RAM (NVRAM) such as PRAM (Phase-change RAM), FeRAM (Ferroelectric RAM), and MRAM (Magnetoresistive RAM) has characteristics of both non-volatile storage and random ac...
In Hwan Doh, Jongmoo Choi, Donghee Lee, Sam H. Noh