Sciweavers

10700 search results - page 208 / 2140
» Generative Design Patterns
Sort
View
196
Voted
ESSOS
2011
Springer
14 years 6 months ago
An Architecture-Centric Approach to Detecting Security Patterns in Software
Abstract. Today, software security is an issue with increasing importance. Developers, software designers, end users, and enterprises have their own needs w.r.t. software security....
Michaela Bunke, Karsten Sohr
DATE
2010
IEEE
161views Hardware» more  DATE 2010»
15 years 7 months ago
BISD: Scan-based Built-In self-diagnosis
Abstract—Built-In Self-Test (BIST) is less often applied to random logic than to embedded memories due to the following reasons: Firstly, for a satisfiable fault coverage it may...
Melanie Elm, Hans-Joachim Wunderlich
CANDC
2009
ACM
15 years 9 months ago
Subliminal wiretapping
Subliminal Wiretapping is a subtly interactive artwork that utilizes random number generation modified through mindmatter effects to supply a continuous stream of words. Frequent,...
Shawn Lawson
USS
2004
15 years 3 months ago
Autograph: Toward Automated, Distributed Worm Signature Detection
Today's Internet intrusion detection systems (IDSes) monitor edge networks' DMZs to identify and/or filter malicious flows. While an IDS helps protect the hosts on its l...
Hyang-Ah Kim, Brad Karp
EUROPLOP
2006
15 years 3 months ago
Patterns for Time-based Hypermedia Artifacts
With the incresing presence on the Web of hypermedia contents with temporal constraints (time-based hypermedia), such as multimedia presentations, there must be a precise form to ...
Rui Lopes, Luís Carriço