Sciweavers

817 search results - page 137 / 164
» Malware behaviour analysis
Sort
View
COST
2007
Springer
163views Multimedia» more  COST 2007»
15 years 6 months ago
Affordances and Cognitive Walkthrough for Analyzing Human-Virtual Human Interaction
This study investigates how the psychological notion of affordance, known from human computer interface design, can be adopted for the analysis and design of communication of a use...
Zsófia Ruttkay, Rieks op den Akker
FMCO
2007
Springer
103views Formal Methods» more  FMCO 2007»
15 years 6 months ago
Safety Guarantees from Explicit Resource Management
We present a language and a program analysis that certifies the safe use of flexible resource management idioms, in particular advance reservation or “block booking” of costl...
David Aspinall, Patrick Maier, Ian Stark
IWSOS
2007
Springer
15 years 6 months ago
Mercator: Self-organizing Geographic Connectivity Maps for Scalable Ad-Hoc Routing
Abstract. A fundamental problem of future networks is to get fully selforganized routing protocols with good scalability properties that produce good paths in a wide range of netwo...
Luis A. Hernando, Unai Arronategui
AICCSA
2006
IEEE
101views Hardware» more  AICCSA 2006»
15 years 5 months ago
Refactoring Tools and Complementary Techniques
Poorly designed software systems are difficult to understand and maintain. Modifying code in one place could lead to unwanted repercussions elsewhere due to high coupling. Adding ...
Martin Drozdz, Derrick G. Kourie, Bruce W. Watson,...
ASWEC
2006
IEEE
15 years 5 months ago
Evaluating software refactoring tool support
Up to 75% of the costs associated with the development of software systems occur post-deployment during maintenance and evolution. Software refactoring is a process which can sign...
Erica Mealy, Paul A. Strooper