Sciweavers

1432 search results - page 248 / 287
» Executable Protocol Models as a Requirements Engineering Too...
Sort
View
CCS
2005
ACM
15 years 3 months ago
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits
Vulnerabilities that allow worms to hijack the control flow of each host that they spread to are typically discovered months before the worm outbreak, but are also typically disc...
Jedidiah R. Crandall, Zhendong Su, Shyhtsun Felix ...
HICSS
2007
IEEE
133views Biometrics» more  HICSS 2007»
15 years 3 months ago
Service-Oriented Software Reengineering: SoSR
Service-Oriented Computing (SOC) enables the development and design of loosely coupled software components for integration with other software system. Since most legacy system wer...
Sam Chung, Joseph Byung Chul An, Sergio Davalos
BCSHCI
2008
14 years 11 months ago
Provoking creative design: making it scale
Creativity is indispensable for more innovative interactive system development. This tutorial is relevant to anyone involved in large projects that are exploiting new technologies...
Neil A. M. Maiden, Sara Jones
103
Voted
SPW
2004
Springer
15 years 2 months ago
Privacy Is Linking Permission to Purpose
Abstract Fabio Massacci1 and Nicola Zannone1 Department of Information and Communication Technology University of Trento - Italy {massacci,zannone} at dit.unitn.it The last years h...
Fabio Massacci, Nicola Zannone
PPOPP
2009
ACM
15 years 10 months ago
Effective performance measurement and analysis of multithreaded applications
Understanding why the performance of a multithreaded program does not improve linearly with the number of cores in a sharedmemory node populated with one or more multicore process...
Nathan R. Tallent, John M. Mellor-Crummey