Sciweavers

1130 search results - page 158 / 226
» Challenges in the design of automotive software
Sort
View
EMSOFT
2004
Springer
15 years 3 months ago
A model-based approach to integrating security policies for embedded devices
Embedded devices like smart cards can now run multiple interacting applications. A particular challenge in this domain is to dynamically integrate diverse security policies. In th...
Michael McDougall, Rajeev Alur, Carl A. Gunter
ICST
2009
IEEE
15 years 4 months ago
Predicting Attack-prone Components
GEGICK, MICHAEL CHARLES. Predicting Attack-prone Components with Source Code Static Analyzers. (Under the direction of Laurie Williams). No single vulnerability detection techniqu...
Michael Gegick, Pete Rotella, Laurie A. Williams
65
Voted
WWW
2008
ACM
15 years 10 months ago
SMash: secure component model for cross-domain mashups on unmodified browsers
Mashup applications mix and merge content (data and code) from multiple content providers in a user's browser, to provide high-value web applications that can rival the user ...
Frederik De Keukelaere, Sumeer Bhola, Michael Stei...
TEI
2010
ACM
173views Hardware» more  TEI 2010»
15 years 4 months ago
ToonTastic: a global storytelling network for kids, by kids
Creativity, collaboration, and cultural understanding are becoming increasingly important in our workplace and society. As educators, we are therefore challenged to create new opp...
Andy Russell
ICDCN
2010
Springer
15 years 4 months ago
An Intelligent IT Infrastructure for the Future
The proliferation of new modes of communication and collaboration has resulted in an explosion of digital information. To turn this challenge into an opportunity, the IT industry ...
Prith Banerjee