Sciweavers

270 search results - page 45 / 54
» Building Software Securely from the Ground Up
Sort
View
BMCBI
2010
169views more  BMCBI 2010»
14 years 10 months ago
eCOMPAGT integrates mtDNA: import, validation and export of mitochondrial DNA profiles for population genetics, tumour dynamics
Background: Mitochondrial DNA (mtDNA) is widely being used for population genetics, forensic DNA fingerprinting and clinical disease association studies. The recent past has uncov...
Hansi Weißensteiner, Sebastian Schönher...
CONEXT
2009
ACM
14 years 11 months ago
ARES: an anti-jamming reinforcement system for 802.11 networks
Dense, unmanaged 802.11 deployments tempt saboteurs into launching jamming attacks by injecting malicious interference. Nowadays, jammers can be portable devices that transmit int...
Konstantinos Pelechrinis, Ioannis Broustis, Srikan...
HPCA
2005
IEEE
15 years 10 months ago
SafeMem: Exploiting ECC-Memory for Detecting Memory Leaks and Memory Corruption During Production Runs
Memory leaks and memory corruption are two major forms of software bugs that severely threaten system availability and security. According to the US-CERT Vulnerability Notes Datab...
Feng Qin, Shan Lu, Yuanyuan Zhou
ITS
1998
Springer
107views Multimedia» more  ITS 1998»
15 years 2 months ago
Toward a Unification of Human-Computer Learning and Tutoring
We define a learning tutor as being an intelligent agent that learns from human tutors and then tutors human learners. The notion of a learning tutor provides a conceptual framewor...
Henry Hamburger, Gheorghe Tecuci
COOPIS
2002
IEEE
15 years 2 months ago
Empirical Differences between COTS Middleware Scheduling Strategies
The proportion of complex distributed real-time embedded (DRE) systems made up of commercial-off-the-shelf (COTS) hardware and software is increasing significantly in response to...
Christopher D. Gill, Fred Kuhns, Douglas C. Schmid...