Sciweavers

2631 search results - page 291 / 527
» Less is More
Sort
View
IEEEARES
2009
IEEE
15 years 11 months ago
A Mobile Ambients-Based Approach for Network Attack Modelling and Simulation
Abstract—Attack Graphs are an important support for assessment and subsequent improvement of network security. They reveal possible paths an attacker can take to break through se...
Virginia N. L. Franqueira, Pascal van Eck, Roel Wi...
HRI
2009
ACM
15 years 10 months ago
Robots in the wild: understanding long-term use
It has long been recognized that novelty effects exist in the interaction with technologies. Despite this recognition, we still know little about the novelty effects associated wi...
Ja-Young Sung, Henrik I. Christensen, Rebecca E. G...
ICSE
2009
IEEE-ACM
15 years 10 months ago
Lightweight fault-localization using multiple coverage types
Lightweight fault-localization techniques use program coverage to isolate the parts of the code that are most suspicious of being faulty. In this paper, we present the results of ...
Raúl A. Santelices, James A. Jones, Yanbing...
ICSE
2009
IEEE-ACM
15 years 10 months ago
Does distributed development affect software quality? An empirical case study of Windows Vista
It is widely believed that distributed software development is riskier and more challenging than collocated development. Prior literature on distributed development in software en...
Christian Bird, Nachiappan Nagappan, Premkumar T. ...
DATE
2009
IEEE
133views Hardware» more  DATE 2009»
15 years 10 months ago
Architectural support for low overhead detection of memory violations
Violations in memory references cause tremendous loss of productivity, catastrophic mission failures, loss of privacy and security, and much more. Software mechanisms to detect me...
Saugata Ghose, Latoya Gilgeous, Polina Dudnik, Ane...