Sciweavers

11573 search results - page 2016 / 2315
» Designing Relational Databases
Sort
View
EATIS
2007
ACM
15 years 8 months ago
Protection of technological measures: juridical definition of a technical tool
The present work aims to bring to discussion and to analysis, the texts of the 6th article of the 2001/29/EC Directive (22nd of May) and the 217th article of the Portuguese law 50...
Lígia Lopes de Sousa Carreto
120
Voted
ECLIPSE
2007
ACM
15 years 8 months ago
An Eclipse-based tool framework for software model management
Software development involves the use of many models and Eclipse provides an ideal infrastructure for building tools to support the use of models. While there is a large selection...
Rick Salay, Marsha Chechik, Steve M. Easterbrook, ...
CANDT
2009
15 years 8 months ago
wConnect: a facebook-based developmental learning community to support women in information technology
The under-representation of women in computer and information science (CIS) has created a crisis in availability of qualified CIS professionals and diversity of perspectives. Many...
Mary Beth Rosson, John M. Carroll, Dejin Zhao, Tim...
PETRA
2010
ACM
15 years 8 months ago
Opportunistic strategies for lightweight signal processing for body sensor networks
We present a mobile platform for body sensor networking based on a smartphone for lightweight signal processing of sensor mote data. The platform allows for local processing of da...
Edmund Y. W. Seto, Eladio Martin, Allen Y. Yang, P...
121
Voted
SP
2010
IEEE
140views Security Privacy» more  SP 2010»
15 years 8 months ago
Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries
Abstract—Unfortunately, malicious software is still an unsolved problem and a major threat on the Internet. An important component in the fight against malicious software is the...
Clemens Kolbitsch, Thorsten Holz, Christopher Krue...
« Prev « First page 2016 / 2315 Last » Next »