Sciweavers

4764 search results - page 363 / 953
» Applications of Error-Control Coding
Sort
View
VEE
2006
ACM
142views Virtualization» more  VEE 2006»
15 years 9 months ago
Secure and practical defense against code-injection attacks using software dynamic translation
One of the most common forms of security attacks involves exploiting a vulnerability to inject malicious code into an executing application and then cause the injected code to be ...
Wei Hu, Jason Hiser, Daniel Williams, Adrian Filip...
VSTTE
2005
Springer
15 years 8 months ago
Verifying Design with Proof Scores
: Verifying design instead of code can be an effective and practical approach to obtaining verified software. This paper argues that proof scores are an attractive method for ver...
Kokichi Futatsugi, Joseph A. Goguen, Kazuhiro Ogat...
SIGSOFT
2005
ACM
16 years 3 months ago
Visual tool for generative programming
A way of combining object-oriented and structural paradigms of software composition is demonstrated in a tool for generative programming. Metaclasses are introduced that are compon...
Pavel Grigorenko, Ando Saabas, Enn Tyugu
ACHI
2008
IEEE
15 years 9 months ago
Face Authentication for Banking
—This paper analyzes the benefit and the limitations of using a particular biometric technology “namely face authentication” for banking applications. We present first the ge...
Baptiste Hemery, Julien Mahier, Marc Pasquet, Chri...
AINA
2008
IEEE
15 years 9 months ago
Transparently Adding Security Properties to Service Orchestration
In this paper, we present a tool allowing the design of orchestration at a high level of abstraction. This tool also allows specifying security properties, also in an way, as anno...
Stéphanie Chollet, Philippe Lalanda, Andr&e...