Sciweavers

1629 search results - page 240 / 326
» Infeasible Code Detection
Sort
View
ASSETS
2007
ACM
15 years 3 months ago
Accessible spaces: navigating through a marked environment with a camera phone
We demonstrate a system designed to assist a visually impaired individual while moving in an unfamiliar environment. Small and economical color markers are placed in key locations...
Kee-Yip Chan, Roberto Manduchi, James Coughlan
COMPSAC
2009
IEEE
15 years 3 months ago
GUI-Based Testing of Boundary Overflow Vulnerability
Boundary overflows are caused by violation of constraints, mostly limiting the range of internal values of a program, and can be provoked by an intruder to gain control of or acce...
Tugkan Tuglular, Can A. Muftuoglu, Özgür...
ECOOP
2007
Springer
15 years 3 months ago
Model-driven Software Refactoring
In this chapter, we explore the emerging research domain of modeldriven software refactoring. Program refactoring is a proven technique that aims at improving the quality of sourc...
Tom Mens, Gabriele Taentzer
HOTOS
2009
IEEE
15 years 3 months ago
Computer Meteorology: Monitoring Compute Clouds
Cloud computing environments allow customers to execute arbitrary code on hardware owned by a cloud provider. While cloud providers use virtualization to ensure isolation between ...
Lionel Litty, H. Andrés Lagar-Cavilla, Davi...
ACSAC
2001
IEEE
15 years 3 months ago
Why Information Security is Hard-An Economic Perspective
According to one common view, information security comes down to technical measures. Given better access control policy models, formal proofs of cryptographic protocols, approved ...
Ross J. Anderson