Sciweavers

757 search results - page 60 / 152
» Composing Security-Aware Software
Sort
View
91
Voted
COMPSAC
2005
IEEE
15 years 9 months ago
Buffer Overrun Prevention Through Component Composition Analysis
Buffer overrun vulnerabilities cause significant security problems, and have proven to be difficult to prevent. In this paper we present a novel approach to tackling the problem...
David Llewellyn-Jones, Madjid Merabti, Qi Shi, Bob...
QSIC
2005
IEEE
15 years 9 months ago
Formal Fault Tree Analysis of State Transition Systems
Fault Tree Analysis (FTA) is a traditional deductive safety analysis technique that is applied during the system design stage. However, traditional FTA does not consider transitio...
Jianwen Xiang, Kazuhiro Ogata
UIST
2005
ACM
15 years 9 months ago
Physical embodiments for mobile communication agents
This paper describes a physically embodied and animated user interface to an interactive call handling agent, consisting of a small wireless animatronic device in the form of a sq...
Stefan Marti, Chris Schmandt
EUC
2005
Springer
15 years 9 months ago
Ubiquitous Organizational Information Service Framework for Large Scale Intelligent Environments
In this paper, we introduce a concrete, practical Ubiquitous Organizational Information (UOI) service framework, providing novice users intelligent and useful services with respect...
Kwang-il Hwang, Won-Hee Lee, Seok-hwan Kim, Doo Se...
108
Voted
AMAST
2004
Springer
15 years 8 months ago
Separate Compositional Analysis of Class-Based Object-Oriented Languages
Abstract. We present a separate compositional analysis for objectoriented languages. We show how a generic static analysis of a context that uses an object can be split into two se...
Francesco Logozzo