Sciweavers

1177 search results - page 165 / 236
» Integrating Security Administration into Software Architectu...
Sort
View
87
Voted
CF
2004
ACM
15 years 6 months ago
Repairing return address stack for buffer overflow protection
Although many defense mechanisms against buffer overflow attacks have been proposed, buffer overflow vulnerability in software is still one of the most prevalent vulnerabilities e...
Yong-Joon Park, Gyungho Lee
105
Voted
DATE
2010
IEEE
149views Hardware» more  DATE 2010»
15 years 5 months ago
Integrated end-to-end timing analysis of networked AUTOSAR-compliant systems
—As Electronic Control Units (ECUs) and embedded software functions within an automobile keep increasing in number, the scale and complexity of automotive embedded systems is gro...
Karthik Lakshmanan, Gaurav Bhatia, Ragunathan Rajk...
129
Voted
JOT
2008
228views more  JOT 2008»
15 years 16 days ago
Adapting the User Interface of Integrated Development Environments (IDEs) for Novice Users
The usability of a user interface is often neglected in the design and development of software applications. An Integrated Development Environment (IDE) is prone to poor usability...
Ying Zou, Michael Lerner, Alex Leung, Scott Moriss...
MODELS
2009
Springer
15 years 7 months ago
RobbyDBMS: a case study on hardware/software product line engineering
The development of a highly configurable data management system is a challenging task, especially if it is to be implemented on an embedded system that provides limited resources...
Jörg Liebig, Sven Apel, Christian Lengauer, T...
91
Voted
EDBTW
2010
Springer
15 years 7 months ago
A practice-oriented framework for measuring privacy and utility in data sanitization systems
Published data is prone to privacy attacks. Sanitization methods aim to prevent these attacks while maintaining usefulness of the data for legitimate users. Quantifying the trade-...
Michal Sramka, Reihaneh Safavi-Naini, Jörg De...