Sciweavers

4307 search results - page 562 / 862
» Dynamic Spyware Analysis
Sort
View
ICSE
2005
IEEE-ACM
16 years 4 months ago
An empirical evaluation of test case filtering techniques based on exercising complex information flows
Some software defects trigger failures only when certain complex information flows occur within the software. Profiling and analyzing such flows therefore provides a potentially i...
David Leon, Wes Masri, Andy Podgurski
PDP
2010
IEEE
15 years 10 months ago
SLA-driven Elastic Cloud Hosting Provider
—It is clear that Cloud computing is and will be a sea change for the Information Technology by changing the way in which both software and hardware are designed and purchased. I...
Josep Oriol Fito, Iñigo Goiri, Jordi Guitar...
ASUNAM
2009
IEEE
15 years 10 months ago
Transformation of Online Representation through Time
In order to understand the evolution of online identities, we measured the correlation between past and current representations of self on the MySpace social network. We applied s...
Roya Feizy, Ian Wakeman, Dan Chalmers
133
Voted
PERCOM
2009
ACM
15 years 10 months ago
Concurrent Event Detection for Asynchronous Consistency Checking of Pervasive Context
—Contexts, the pieces of information that capture the characteristics of computing environments, are often inconsistent in the dynamic and uncertain pervasive computing environme...
Yu Huang 0002, Xiaoxing Ma, Jiannong Cao, XianPing...
AOSD
2009
ACM
15 years 10 months ago
Expressive scoping of distributed aspects
Dynamic deployment of aspects brings greater flexibility and reuse potential, but requires proper means for scoping aspects. Scoping issues are particularly crucial in a distribu...
Éric Tanter, Johan Fabry, Rémi Douen...