Sciweavers

5241 search results - page 903 / 1049
» Embedded Programming with C
Sort
View
113
Voted
SBMF
2009
Springer
105views Formal Methods» more  SBMF 2009»
15 years 8 months ago
Verifying Compiled File System Code
Abstract. This paper presents a case study on retrospective verication of the Linux Virtual File System (VFS), which is aimed at checking for violations of API usage rules and mem...
Jan Tobias Mühlberg, Gerald Lüttgen
104
Voted
EICS
2009
ACM
15 years 8 months ago
Fiia: user-centered development of adaptive groupware systems
Adaptive groupware systems support changes in users’ locations, devices, roles and collaborative structure. Developing such systems is difficult due to the complex distributed ...
Christopher Wolfe, T. C. Nicholas Graham, W. Greg ...
108
Voted
SIGCSE
2010
ACM
183views Education» more  SIGCSE 2010»
15 years 8 months ago
Electronic commerce virtual laboratory
Website security is essential for successful e-commerce ventures, but the vital “how-to” components of security are often lacking in academic courses. This paper describes our...
Joel Coffman, Alfred C. Weaver
81
Voted
BIBE
2008
IEEE
115views Bioinformatics» more  BIBE 2008»
15 years 8 months ago
The Mouse Resource Browser (MRB) - A near-complete registry of mouse resources
—The Mouse Resource Browser MRB (http://bioit.fleming.gr/mrb) is an easy-to-use database for searching and retrieving mouse resource information. Currently, MRB hosts a list of 2...
Michael Zouberakis, C. Chandras, John M. Hancock, ...
104
Voted
COMPSAC
2008
IEEE
15 years 8 months ago
Mutation-Based Testing of Buffer Overflow Vulnerabilities
Buffer overflow (BOF) is one of the major vulnerabilities that leads to non-secure software. Testing an implementation for BOF vulnerabilities is challenging as the underlying rea...
Hossain Shahriar, Mohammad Zulkernine