Sciweavers

3920 search results - page 698 / 784
» Challenges in Software Evolution
Sort
View
132
Voted
CHI
2010
ACM
15 years 10 months ago
Model-driven development of advanced user interfaces
This paper reports on the 2nd Workshop on Model Driven Development of Advanced User Interfaces (MDDAUI’06) held on October 2nd, 2006 at the MoDELS’06 conference in Genova, Ital...
Jan Van den Bergh, Gerrit Meixner, Kai Breiner, An...
149
Voted
CC
2010
Springer
190views System Software» more  CC 2010»
15 years 10 months ago
Is Reuse Distance Applicable to Data Locality Analysis on Chip Multiprocessors?
On Chip Multiprocessors (CMP), it is common that multiple cores share certain levels of cache. The sharing increases the contention in cache and memory-to-chip bandwidth, further h...
Yunlian Jiang, Eddy Z. Zhang, Kai Tian, Xipeng She...
CCS
2009
ACM
15 years 10 months ago
Countering kernel rootkits with lightweight hook protection
Kernel rootkits have posed serious security threats due to their stealthy manner. To hide their presence and activities, many rootkits hijack control flows by modifying control d...
Zhi Wang, Xuxian Jiang, Weidong Cui, Peng Ning
HICSS
2007
IEEE
156views Biometrics» more  HICSS 2007»
15 years 10 months ago
KnowFlow - A Hybrid Approach to Identifying and Visualizing Distributed Knowledge Work Practices
Understanding collaborative work practices represents a critical factor in and a necessary fundament for the development of effective Computer Supported Collaborative Work (CSCW) ...
Markus Strohmaier, Stefanie N. Lindstaedt
141
Voted
CCS
2007
ACM
15 years 10 months ago
Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction
An alarming trend in malware attacks is that they are armed with stealthy techniques to detect, evade, and subvert malware detection facilities of the victim. On the defensive sid...
Xuxian Jiang, Xinyuan Wang, Dongyan Xu