Sciweavers

2342 search results - page 387 / 469
» Design, Implementation and Characterization of a Cooperative...
Sort
View
ACSAC
2006
IEEE
15 years 1 months ago
Data Sandboxing: A Technique for Enforcing Confidentiality Policies
When an application reads private / sensitive information and subsequently communicates on an output channel such as a public file or a network connection, how can we ensure that ...
Tejas Khatiwala, Raj Swaminathan, V. N. Venkatakri...
ICSE
2010
IEEE-ACM
14 years 11 months ago
Linking e-mails and source code artifacts
E-mails concerning the development issues of a system constitute an important source of information about high-level design decisions, low-level implementation concerns, and the s...
Alberto Bacchelli, Michele Lanza, Romain Robbes
TC
2008
14 years 9 months ago
Secure Memory Accesses on Networks-on-Chip
Security is gaining relevance in the development of embedded devices. Toward a secure system at each level of design, this paper addresses security aspects related to Network-on-Ch...
Leandro Fiorin, Gianluca Palermo, Slobodan Lukovic...
DIGRA
2005
Springer
15 years 3 months ago
socio-ec(h)o: Ambient Intelligence and Gameplay
This paper describes the preliminary research of an ambient intelligent system known as socioec(h)o. socio-ec(h)o explores the design and implementation of an ambient intelligent ...
Ron Wakkary, Marek Hatala, Robb Lovell, Milena Dro...
ICSE
1997
IEEE-ACM
15 years 1 months ago
Visualizing Interactions in Program Executions
Implementing, validating, modifying, or reengineering an object-oriented system requires an understanding of the object and class interactions which occur as a program executes. T...
Dean F. Jerding, John T. Stasko, Thomas Ball