Sciweavers

15777 search results - page 3028 / 3156
» Engineering in Software
Sort
View
170
Voted
ACSAC
2010
IEEE
15 years 1 months ago
G-Free: defeating return-oriented programming through gadget-less binaries
Despite the numerous prevention and protection mechanisms that have been introduced into modern operating systems, the exploitation of memory corruption vulnerabilities still repr...
Kaan Onarlioglu, Leyla Bilge, Andrea Lanzi, Davide...
124
Voted
ANCS
2010
ACM
15 years 1 months ago
NetEx: efficient and cost-effective internet bulk content delivery
The Internet is witnessing explosive growth in traffic due to bulk content transfers, such as multimedia and software downloads, and online sharing of personal, commercial, and sc...
Massimiliano Marcon, Nuno Santos, P. Krishna Gumma...
166
Voted
GROUP
2010
ACM
15 years 1 months ago
Searching for reputable source code on the web
Looking for source code on the Web is a common practice among software developers. Previous research has shown that developers use social cues over technical cues to evaluate sour...
Rosalva E. Gallardo-Valencia, Phitchayaphong Tanti...
DMIN
2009
180views Data Mining» more  DMIN 2009»
15 years 1 months ago
APHID: A Practical Architecture for High-Performance, Privacy-Preserving Data Mining
While the emerging field of privacy preserving data mining (PPDM) will enable many new data mining applications, it suffers from several practical difficulties. PPDM algorithms are...
Jimmy Secretan, Anna Koufakou, Michael Georgiopoul...
188
Voted
ECEASST
2010
15 years 1 months ago
GUI Inspection from Source Code Analysis
Abstract: Graphical user interfaces (GUIs) are critical components of todays software. Given their increased relevance, correctness and usability of GUIs are becoming essential. Th...
João Carlos Silva 0002, José Creissa...
« Prev « First page 3028 / 3156 Last » Next »